Sciweavers

143 search results - page 3 / 29
» Hash, Displace, and Compress
Sort
View
INDOCRYPT
2010
Springer
13 years 3 months ago
Speeding Up the Wide-Pipe: Secure and Fast Hashing
In this paper we propose a new sequential mode of operation
Mridul Nandi, Souradyuti Paul
ICIP
2003
IEEE
14 years 7 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran
WEWORC
2007
148views Cryptology» more  WEWORC 2007»
13 years 7 months ago
Preimages for Reduced-Round Tiger
The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function ...
Sebastiaan Indesteege, Bart Preneel
DCC
2010
IEEE
14 years 19 days ago
gFPC: A Self-Tuning Compression Algorithm
This paper presents and evaluates gFPC, a self-tuning implementation of the FPC compression algorithm for double-precision floating-point data. gFPC uses a genetic algorithm to re...
Martin Burtscher, Paruj Ratanaworabhan