Ways to restrict the differential path

نویسندگان

  • ZiJie Xu
  • Ke Xu
چکیده

People had developed some attack methods to attack hash function. These methods need to choose some "differential pattern"[Dau05]. We present a way to restrict the collisions that hold the "differential pattern". At the same time, to build a hash function that meet the different needs, we propose a construction.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ways of Respecting Human Dignity in Islamic Law

Qur’anic verses and hadiths certify that Allah has bestowed dignity upon mankind. Therefore, man essentially deserves respect. Islamic law has primarily made use of two ways to safeguard human dignity. First, there are prohibitions in Islamic law that safeguard man’s dignity. Second, the penal laws of Islam restrict punishments to those cases where they are absolutely necessary. In this article...

متن کامل

Data-Depend Hash Algorithm

Hash algorithm is the algorithm that computes a fixed size message digest from arbitrary size messages. After SHA-0 was published, some technologys that analyse and attack hash algorithm is developed. The major technologys is Differential attack. Papers[Wy05, Dau05] has explain the attack. Differential attack is the best technique to attack hash function. To attack hash function, it need do the...

متن کامل

Numerical solution of higher index DAEs using their IAE's structure: Trajectory-prescribed path control problem and simple pendulum

In this paper, we solve higher index differential algebraic equations (DAEs) by transforming them into integral algebraic equations (IAEs). We apply collocation methods on continuous piece-wise polynomials space to solve the obtained higher index IAEs. The efficiency of the given method is improved by using a recursive formula for computing the integral part. Finally, we apply the obtained algo...

متن کامل

Longest Path in Networks of Queues in the Steady-State

Due to the importance of longest path analysis in networks of queues, we develop an analytical method for computing the steady-state distribution function of longest path in acyclic networks of queues. We assume the network consists of a number of queuing systems and each one has either one or infinite servers. The distribution function of service time is assumed to be exponential or Erlang. Fu...

متن کامل

Integrating ODE's in the Complex Plane-Pole Vaulting

Most existing algorithms for solving initial value problems in ordinary differential equations implicitly assume that all variables are real. If the real-valued assumption is removed, the solution can be extended by analytic continuation along a path of integration in the complex plane of the independent variable. This path is chosen to avoid singularities which can make the solution difficult ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011