Ways to restrict the differential path
نویسندگان
چکیده
People had developed some attack methods to attack hash function. These methods need to choose some "differential pattern"[Dau05]. We present a way to restrict the collisions that hold the "differential pattern". At the same time, to build a hash function that meet the different needs, we propose a construction.
منابع مشابه
Ways of Respecting Human Dignity in Islamic Law
Qur’anic verses and hadiths certify that Allah has bestowed dignity upon mankind. Therefore, man essentially deserves respect. Islamic law has primarily made use of two ways to safeguard human dignity. First, there are prohibitions in Islamic law that safeguard man’s dignity. Second, the penal laws of Islam restrict punishments to those cases where they are absolutely necessary. In this article...
متن کاملData-Depend Hash Algorithm
Hash algorithm is the algorithm that computes a fixed size message digest from arbitrary size messages. After SHA-0 was published, some technologys that analyse and attack hash algorithm is developed. The major technologys is Differential attack. Papers[Wy05, Dau05] has explain the attack. Differential attack is the best technique to attack hash function. To attack hash function, it need do the...
متن کاملNumerical solution of higher index DAEs using their IAE's structure: Trajectory-prescribed path control problem and simple pendulum
In this paper, we solve higher index differential algebraic equations (DAEs) by transforming them into integral algebraic equations (IAEs). We apply collocation methods on continuous piece-wise polynomials space to solve the obtained higher index IAEs. The efficiency of the given method is improved by using a recursive formula for computing the integral part. Finally, we apply the obtained algo...
متن کاملLongest Path in Networks of Queues in the Steady-State
Due to the importance of longest path analysis in networks of queues, we develop an analytical method for computing the steady-state distribution function of longest path in acyclic networks of queues. We assume the network consists of a number of queuing systems and each one has either one or infinite servers. The distribution function of service time is assumed to be exponential or Erlang. Fu...
متن کاملIntegrating ODE's in the Complex Plane-Pole Vaulting
Most existing algorithms for solving initial value problems in ordinary differential equations implicitly assume that all variables are real. If the real-valued assumption is removed, the solution can be extended by analytic continuation along a path of integration in the complex plane of the independent variable. This path is chosen to avoid singularities which can make the solution difficult ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2011 شماره
صفحات -
تاریخ انتشار 2011