Sciweavers

713 search results - page 59 / 143
» Dispersing Hash Functions
Sort
View
CVRMED
1997
Springer
15 years 1 months ago
Image registration: convex weighting functions for histogram-based similarity measures
Recently the entropy-similarity measure has been introduced for the registration of image pairs prior to subtraction in medical imaging e.g. digital subtraction angiography (DSA). ...
Thorsten M. Buzug, Jürgen Weese, Carola Fassn...
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
How Risky Is the Random-Oracle Model?
RSA-FDH and many other schemes secure in the Random-Oracle Model (ROM) require a hash function with output size larger than standard sizes. We show that the random-oracle instanti...
Gaëtan Leurent, Phong Q. Nguyen
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
15 years 2 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
FSE
2008
Springer
91views Cryptology» more  FSE 2008»
14 years 11 months ago
SWIFFT: A Modest Proposal for FFT Hashing
We propose SWIFFT, a collection of compression functions that are highly parallelizable and admit very efficient implementations on modern microprocessors. The main technique under...
Vadim Lyubashevsky, Daniele Micciancio, Chris Peik...
IEICET
2008
147views more  IEICET 2008»
14 years 9 months ago
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
In this paper, we introduce new compression function design principles supporting variable output lengths (multiples of size n). They are based on a function or block cipher with a...
Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul ...