Sciweavers

3 search results - page 1 / 1
» Update on SHA-1
Sort
View
CTRSA
2005
Springer
92views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Update on SHA-1
Abstract. We report on the experiments we performed in order to assess the security of SHA-1 against the attack by Chabaud and Joux [5]. We present some ideas for optimizations of ...
Vincent Rijmen, Elisabeth Oswald
ICDE
2004
IEEE
120views Database» more  ICDE 2004»
14 years 6 months ago
Algebraic Signatures for Scalable Distributed Data Structures
Signatures detect changes to the data objects. Numerous schemes a known, e.g., the popular hash based SHA-1 standard. We propose a nov scheme we call algebraic signatures. We use ...
Witold Litwin, Thomas J. E. Schwarz
CCS
2008
ACM
13 years 7 months ago
A fast real-time memory authentication protocol
We propose a new real-time authentication scheme for memory. As in previous proposals the scheme uses a Merkle tree to guarantee dynamic protection of memory. We use the universal...
Yin Hu, Ghaith Hammouri, Berk Sunar