Sciweavers

206 search results - page 3 / 42
» Analysis of Multivariate Hash Functions
Sort
View
ASIACRYPT
2006
Springer
15 years 3 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
SIBGRAPI
2006
IEEE
15 years 5 months ago
Exploratory visualization based on multidimensional transfer functions and star coordinates
Exploration and analysis of multivariate data play an important role in different domains. This work proposes a simple interface prototype that allows a human user to visually expl...
Alex Laier Bordignon, Rener Castro, Hélio L...
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
15 years 5 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
15 years 3 months ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
ACISP
2010
Springer
15 years 1 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...