منابع مشابه
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less than 2 bits. The underlying block cipher, based on the Advanced Encryption Standard (AES), takes a 512-bit key and operates on 512-bit blocks of plaintext. Whirlpool has been endorsed by NESSIE (New European Schemes for ...
متن کاملCryptanalysis of HMAC/NMAC-Whirlpool
In this paper, we present universal forgery and key recovery attacks on the most popular hash-based MAC constructions, e.g., HMAC and NMAC, instantiated with an AES-like hash function Whirlpool. These attacks work with Whirlpool reduced to 6 out of 10 rounds in single-key setting. To the best of our knowledge, this is the first result on “original” key recovery for HMAC (previous works only suc...
متن کاملStructural Health Monitoring With Whirlpool
We propose a novel data delivery strategy, called Whirlpool, for efficient SHM using Wireless Sensor Networks. Whirlpool implements a rotating interrogation of a monitoring structure and provides collision-aware scheduling of the monitoring queries. The Whirlpool strategy can be tuned for the required Quality of Data (QoD). We apply Whirlpool to examine the unique properties of output signals o...
متن کاملThe Progenitor of SN 2005cs in the Whirlpool Galaxy
The progenitor of SN 2005cs, in the galaxy M51, is identified in pre-explosion HST ACS WFC imaging. Differential astrometry, with post-explosion ACS HRC F555W images, permitted the identification of the progenitor with an accuracy of 0.006. The progenitor was detected in the F814W pre-explosion image with I = 23.3± 0.2, but was below the detection thresholds of the F435W and F555W images, with ...
متن کاملRebound Distinguishers: Results on the Full Whirlpool Compression Function
Whirlpool is a hash function based on a block cipher that can be seen as a scaled up variant of the AES. The main difference is the (compared to AES) extremely conservative key schedule. In this work, we present a distinguishing attack on the full compression function of Whirlpool. We obtain this result by improving the rebound attack on reduced Whirlpool with two new techniques. First, the inb...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia IUTAM
سال: 2013
ISSN: 2210-9838
DOI: 10.1016/j.piutam.2013.04.006