Sciweavers

713 search results - page 66 / 143
» Dispersing Hash Functions
Sort
View
APPROX
2008
Springer
71views Algorithms» more  APPROX 2008»
14 years 11 months ago
Tight Bounds for Hashing Block Sources
It is known that if a 2-universal hash function H is applied to elements of a block source (X1, . . . , XT ), where each item Xi has enough min-entropy conditioned on the previous...
Kai-Min Chung, Salil P. Vadhan
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
14 years 10 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
ICISC
2007
97views Cryptology» more  ICISC 2007»
14 years 11 months ago
New Local Collisions for the SHA-2 Hash Family
The starting point for collision attacks on practical hash functions is a local collision. In this paper, we make a systematic study of local collisions for the SHA-2 family. The p...
Somitra Kumar Sanadhya, Palash Sarkar
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
14 years 7 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
APWEB
2005
Springer
15 years 3 months ago
Checking Multivalued Dependencies in XML
Recently, the issues of how to define functional dependencies (XFDs) and multivalued dependencies (XMVDs) in XML have been investigated. In this paper we consider the problem of ...
Jixue Liu, Millist W. Vincent, Chengfei Liu, Mukes...