Sciweavers

128 search results - page 8 / 26
» Weak Verifiable Random Functions
Sort
View
EUROCRYPT
2005
Springer
15 years 3 months ago
Cryptanalysis of the Hash Functions MD4 and RIPEMD
MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the dedicated hash functions such as MD5, SHAx, RIPEMD, and HAVAL. In 1996, Dobbertin showed ...
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, ...
MMAS
2010
Springer
14 years 4 months ago
Source Localization in Random Acoustic Waveguides
Mode coupling due to scattering by weak random inhomogeneities in waveguides leads to loss of coherence of wave fields at long distances of propagation. This in turn leads to serio...
Liliana Borcea, Leila Issa, Chrysoula Tsogka
75
Voted
CORR
2012
Springer
222views Education» more  CORR 2012»
13 years 5 months ago
A limit process for partial match queries in random quadtrees
We consider the problem of recovering items matching a partially specified pattern in multidimensional trees (quad trees and k-d trees). We assume the classical model where the d...
Nicolas Broutin, Ralph Neininger, Henning Sulzbach
77
Voted
CCS
2010
ACM
14 years 10 months ago
Algebraic pseudorandom functions with improved efficiency from the augmented cascade
We construct an algebraic pseudorandom function (PRF) that is more efficient than the classic NaorReingold algebraic PRF. Our PRF is the result of adapting the cascade constructio...
Dan Boneh, Hart William Montgomery, Ananth Raghuna...
HASE
2008
IEEE
14 years 9 months ago
Randomization Based Probabilistic Approach to Detect Trojan Circuits
In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be...
Susmit Jha, Sumit Kumar Jha