Sciweavers

713 search results - page 22 / 143
» Dispersing Hash Functions
Sort
View
IMA
2005
Springer
113views Cryptology» more  IMA 2005»
15 years 3 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent...
BIOADIT
2006
Springer
15 years 1 months ago
Packet Classification with Evolvable Hardware Hash Functions - An Intrinsic Approach
Bandwidth demands of communication networks are rising permanently. Thus, the requirements to modern routers regarding packet classification are rising accordingly. Conventional al...
Harald Widiger, Ralf Salomon, Dirk Timmermann
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
14 years 11 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
ACL2
2006
ACM
15 years 3 months ago
Function memoization and unique object representation for ACL2 functions
We have developed an extension of ACL2 that includes the implementation of hash-based association lists and function memoization; this makes some algorithms execute more quickly. ...
Robert S. Boyer, Warren A. Hunt Jr.
GLOBECOM
2007
IEEE
15 years 4 months ago
Optimal Power Allocation for Linear Dispersion Codes Over Correlated MIMO Channels with Channel State Feedback
— The design of spatio-temporal power allocation schemes is considered for space-time coding over spatially correlated multiple-input multiple-output (MIMO) channels. The focus i...
Che Lin, Vasanthan Raghavan, Venugopal V. Veeraval...