Sciweavers

658 search results - page 69 / 132
» The Grindahl Hash Functions
Sort
View
AFRICACRYPT
2009
Springer
15 years 4 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...
IEAAIE
2009
Springer
15 years 4 months ago
Spatial Exact Match Query Based on the NA-Tree Approach in P2P Systems
In this paper, we propose to apply an NA-tree in the Chord system to encode spatial region data in the data key part used in the hash function to data search. That is, we combine t...
Ye-In Chang, Chen-Chang Wu, Ching-I Wang
AINA
2005
IEEE
15 years 3 months ago
Efficient Secret Sharing with Access Structures in a Hierarchy
2004, Chang et al. suggested an approach that solves the problem of secret sharing with access structures in a hierarchy. They used the concept of discrete logarithmto reuse shado...
Chu-Hsing Lin, Wei Lee
ACSAC
1999
IEEE
15 years 2 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
AMC
2005
116views more  AMC 2005»
14 years 9 months ago
The design of integrating subliminal channel with access control
Recently, Lee and Yang proposed a subliminal scheme which employs an access control in a hierarchy. In their scheme, chief users use a one-way hash function to compute their subord...
Narn-Yih Lee, Shu-Ya Yang