搜索结果: 1-11 共查到“军事学 Cryptographic Hash Function”相关记录11条 . 查询时间(0.14 秒)
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs
Cryptographic hash functions Supersingular elliptic curves Isogeny graphs
2017/12/19
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs.
Finding Bugs in Cryptographic Hash Function Implementations
Cryptographic Algorithm Cryptographic Hash Function Combinatorial Testing
2017/9/18
Developing an approach to test cryptographic hash function implementations can be particularly difficult, and bugs can remain unnoticed for a very long time. We revisit the NIST SHA-3 hash function co...
In this paper, a new way to construct cryptographic hash function is given.
The cryptographic hash function is generalized to uncertain function which has various
specific function forms. When compu...
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
implementation / AES ECHO hash functions implementation SHA-3
2012/3/29
We propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-$5$ and Virtex-$6$ FPGAs. Our architecture is built around a...
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO
AES ECHO hash functions implementation SHA-3
2011/2/24
We propose a compact coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function ECHO on Virtex-$5$ and Virtex-$6$ FPGAs. Our architecture is built around a...
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Linear Approximations BLUE MIDNIGHT WISH Cryptographic Hash Function
2009/9/27
BLUE MIDNIGHT WISH hash function is the fastest among
14 algorithms in the second round of SHA-3 competition [1]. At the
beginning of this round authors were invited to add some tweaks before
Septe...
A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function
Linear Approximations BLUE MIDNIGHT WISH Cryptographic Hash Function
2009/9/22
BLUE MIDNIGHT WISH hash function is the fastest among
14 algorithms in the second round of SHA-3 competition [1]. At the
beginning of this round authors were invited to add some tweaks before
Septe...
A Fast Provably Secure Cryptographic Hash Function
hash functions syndrome decoding NP-completeness
2009/4/10
We propose a family of fast and provably secure cryptographic
hash functions. The security of these functions relies directly
on the well-known syndrome decoding problem for linear codes. Attacks
o...
Cryptographic Hash-Function Basics:Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance,and Collision Resistance
collision resistance cryptographic hash functions preimage resistance
2009/3/23
We consider basic notions of security for cryptographic hash functions: collision resistance,
preimage resistance, and second-preimage resistance. We give seven different definitions that
correspond...
Cryptanalysis of a Provably Secure Cryptographic Hash Function
Cryptanalysis Secure Cryptographic Hash Function
2009/3/20
We present a cryptanalysis of a provably secure cryptographic hash function
proposed by Augot, Finiasz and Sendrier in [1]. Our attack is a variant of Wagner's
generalized birthday attack. It is sig...
3C-A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
3C-A Provably Secure Pseudorandom Function Message Authentication Code Cryptographic Hash Function
2009/3/13
We propose a new cryptographic construction called 3C, which works as a pseudoran-
dom function (PRF), message authentication code (MAC) and cryptographic hash function. The 3C-
construction is obta...