مفاهیم تکنولوژی Twister

author

  • منتهایی, علیرضا
Abstract:

This article doesn't have abstract

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Cryptanalysis of Twister

In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 2 compression function evaluations. Furthermore, we show how the compression function attack can be extended to construct collisions for Twister-512 with complexity of about 2. 1 Description of Twister The hash function Twister is an iterated hash fu...

full text

twister - a P2P microblogging platform

This paper proposes a new microblogging architecture based on peerto-peer networks overlays. The proposed platform is comprised of three mostly independent overlay networks. The first provides distributed user registration and authentication and is based on the Bitcoin protocol. The second one is a Distributed Hash Table (DHT) overlay network providing key/value storage for user resources and t...

full text

Mersenne Twister and Fubuki Stream/block Cipher

We propose two stream ciphers based on a non-secure pseudorandom number generator (called the mother generator). The mother generator is here chosen to be the Mersenne Twister (MT), a widely used 32-bit integer generator having 19937 bits of internal state and period 219937 − 1. One proposal is CryptMT, which computes the accumulative product of the output of MT, and use the most significant 8 ...

full text

Anti - holomorphic twister and symplectic structure ∗ †

It is well known that the twisters, section of twister space, classify the almost complex structure on even dimensional Riemannian manifold X. We will show that existence of a harmonic and anti-holomorphic twister is equivalent to having a symplectic structure on X

full text

Twister Generator of Arbitrary Uniform Sequences

Twisting generators for pseudorandom numbers may use a congruential array to simulate stochastic sequences. Typically, the computer program controls the quantity of elements in array to limit the random access memory. This technique may have limitations in situations where the stochastic sequences have an insufficient size for some application tasks, ranging from theoretical mathematics and tec...

full text

Mersenne twister-based RFID authentication protocol

This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for radio-frequency identification (RFID) tags. The proposed scheme is more secure than its predecessors. The vulnerabilities of previous schemes based on triangular functions and rotation have been demonstrated in traditional and rotational cryptanalysis. In this paper, we summarize the successful attacks on...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 1383  issue 10

pages  12- 13

publication date 2004-05

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

No Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023