Narrow T-Functions

نویسنده

  • Magnus Daum
چکیده

T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building blocks which can be used to construct efficient and secure schemes, for example block ciphers, stream ciphers or hash functions. In the present paper, we define the narrowness of a T-function and study how this property affects the strength of a T-function as a cryptographic primitive. We define a new data strucure, called a solution graph, that enables solving systems of equations given by T-functions. The efficiency of the algorithms which we propose for solution graphs depends significantly on the narrowness of the involved T-functions. Thus the subclass of T-functions with small narrowness appears to be weak and should be avoided in cryptographic schemes. Furthermore, we present some extensions to the methods of using solution graphs, which make it possible to apply these algorithms also to more general systems of equations, which may appear, for example, in the cryptanalysis of hash functions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Nonsingular Green’s Functions for Multi-Layer Homogeneous Microstrip Lines

In this article, three new green's functions are presented for a narrow strip line (not a thin wire) inside or on a homogeneous dielectric, supposing quasi-TEM dominant mode. These functions have no singularity in contrast to so far presented ones, so that they can be used easily to determine the capacitance matrix of multi-layer and single-layer homogeneous coupled microstrip lines. To obtain ...

متن کامل

Antigen-presenting property of mesenchymal stem cells occurs during a narrow window at low levels of interferon-

Mesenchymal stem cells (MSCs) are mostly found around the vasculature system of the adult bone marrow (BM). They function as immune suppressors, express MHC-II, are phagocytic, and support T-cell cytotoxicity. We hypothesize that these contradictory properties of MSCs are important for BM homeostasis and occur partly through antigen presentation (antigen-presenting cells [APCs]) within a narrow...

متن کامل

Antigen-presenting property of mesenchymal stem cells occurs during a narrow window at low levels of interferon-gamma.

Mesenchymal stem cells (MSCs) are mostly found around the vasculature system of the adult bone marrow (BM). They function as immune suppressors, express MHC-II, are phagocytic, and support T-cell cytotoxicity. We hypothesize that these contradictory properties of MSCs are important for BM homeostasis and occur partly through antigen presentation (antigen-presenting cells [APCs]) within a narrow...

متن کامل

Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates

In this note we show a consequence of the recent observation that narrow-pipe hash designs manifest an abberation from ideal random functions for finding collisions for those functions with complexities much lower than the so called generic birthday paradox lower bound. The problem is generic for narrow-pipe designs including classic Merkle-Damg̊ard designs but also recent narrow-pipe SHA-3 cand...

متن کامل

THE 7/11 RULE AND AN ESTIMATE OF mρ

The two-point functions for the vector and axial currents Vμ = dγμu and Aμ = dγμγ5u contain information on the hadronic resonances ρ, ρ , a1, etc. While it has thus far not been possible to calculate these two-point functions from QCD, their behavior is constrained at low energy by Chiral Perturbation Theory (ChPT), at high energy by the OPE, and at all scales by large Nc, in which limit the tw...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005