In this paper we design several double length hash functions and study their security properties in the random oracle model. We design a class of double length hash functions (and ...
The use of fractals in computer graphics and vision in modeling unstructured images, and compressing images, is well known. However, the use of fractals for indexing images in con...
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
This paper presents a power evaluation framework designed for estimating power consumption of a new video telephone compression standard, ITU-H.263, at the system level. A hierarc...
Abstract. We address the problems of pattern matching and approximate pattern matching in the sketching model. We show that it is impossible to compress the text into a small sketc...
Ziv Bar-Yossef, T. S. Jayram, Robert Krauthgamer, ...