Sciweavers

658 search results - page 54 / 132
» The Grindahl Hash Functions
Sort
View
98
Voted
CARDIS
1998
Springer
110views Hardware» more  CARDIS 1998»
15 years 5 months ago
Reducing the Collision Probability of Alleged Comp128
Wagner, Goldberg and Briceno have recently published an attack [2] on what they believe to be Comp128, the GSM A3A8 authentication hash function [1]. Provided that the attacker has...
Helena Handschuh, Pascal Paillier
94
Voted
CTRSA
2006
Springer
129views Cryptology» more  CTRSA 2006»
15 years 4 months ago
An Optimal Non-interactive Message Authentication Protocol
Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SASbased non-interactive message aut...
Sylvain Pasini, Serge Vaudenay
67
Voted
CORR
2010
Springer
62views Education» more  CORR 2010»
15 years 25 days ago
A Derandomized Sparse Johnson-Lindenstrauss Transform
Recent work of [Dasgupta-Kumar-Sarl
Daniel M. Kane, Jelani Nelson
93
Voted
ISW
2000
Springer
15 years 4 months ago
Weighted One-Way Hash Chain and Its Applications
An one-way hash chain generated by the iterative use of a one-way hash function on a secret value has recently been widely employed to develop many practical cryptographic solution...
Sung-Ming Yen, Yuliang Zheng
ICCV
2003
IEEE
16 years 2 months ago
Fast Pose Estimation with Parameter-Sensitive Hashing
Example-based methods are effective for parameter estimation problems when the underlying system is simple or the dimensionality of the input is low. For complex and high-dimensio...
Gregory Shakhnarovich, Paul A. Viola, Trevor Darre...