مفاهیم تکنولوژی Twister

نویسنده

  • منتهایی, علیرضا
چکیده مقاله:

این مقاله چکیده ندارد

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Twister

In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 2 compression function evaluations. Furthermore, we show how the compression function attack can be extended to construct collisions for Twister-512 with complexity of about 2. 1 Description of Twister The hash function Twister is an iterated hash fu...

متن کامل

twister - a P2P microblogging platform

This paper proposes a new microblogging architecture based on peerto-peer networks overlays. The proposed platform is comprised of three mostly independent overlay networks. The first provides distributed user registration and authentication and is based on the Bitcoin protocol. The second one is a Distributed Hash Table (DHT) overlay network providing key/value storage for user resources and t...

متن کامل

Mersenne Twister and Fubuki Stream/block Cipher

We propose two stream ciphers based on a non-secure pseudorandom number generator (called the mother generator). The mother generator is here chosen to be the Mersenne Twister (MT), a widely used 32-bit integer generator having 19937 bits of internal state and period 219937 − 1. One proposal is CryptMT, which computes the accumulative product of the output of MT, and use the most significant 8 ...

متن کامل

Anti - holomorphic twister and symplectic structure ∗ †

It is well known that the twisters, section of twister space, classify the almost complex structure on even dimensional Riemannian manifold X. We will show that existence of a harmonic and anti-holomorphic twister is equivalent to having a symplectic structure on X

متن کامل

Twister Generator of Arbitrary Uniform Sequences

Twisting generators for pseudorandom numbers may use a congruential array to simulate stochastic sequences. Typically, the computer program controls the quantity of elements in array to limit the random access memory. This technique may have limitations in situations where the stochastic sequences have an insufficient size for some application tasks, ranging from theoretical mathematics and tec...

متن کامل

Mersenne twister-based RFID authentication protocol

This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for radio-frequency identification (RFID) tags. The proposed scheme is more secure than its predecessors. The vulnerabilities of previous schemes based on triangular functions and rotation have been demonstrated in traditional and rotational cryptanalysis. In this paper, we summarize the successful attacks on...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 1383  شماره 10

صفحات  12- 13

تاریخ انتشار 2004-05

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

کلمات کلیدی برای این مقاله ارائه نشده است

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023