Sciweavers

20 search results - page 1 / 4
» A New Strategy for Finding a Differential Path of SHA-1
Sort
View
ACISP
2007
Springer
15 years 1 months ago
A New Strategy for Finding a Differential Path of SHA-1
In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path o...
Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwa...
77
Voted
LCN
2003
IEEE
15 years 2 months ago
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
In this paper, we introduce statistical methods to estimate the stability of paths in a mobile wireless ad hoc environment. Identifying stable paths helps to reduce control trafï¬...
Michael Gerharz, Christian de Waal, Peter Martini,...
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
14 years 11 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
TELSYS
2010
122views more  TELSYS 2010»
14 years 7 months ago
Transmission scheduling for multi-homed transport protocols with network failure tolerance
In heterogeneous network environments, the network connections of a multi-homed device may have significant bandwidth differential. For a multihomed transmission protocol designed ...
Yuansong Qiao, Enda Fallon, John Murphy, Liam Murp...
HICSS
2003
IEEE
135views Biometrics» more  HICSS 2003»
15 years 2 months ago
Market Entry Strategies of Application Service Providers: Identifying Strategic Differentiation
In the last few years there has been much interest in the delivery of software-as-a-service. The concept of the remote delivery of software by Application Service Providers (ASPs)...
Bhavini Desai, Vishanth Weerakkody, Wendy Currie, ...