مفاهیم تکنولوژی Twister
نویسنده
چکیده مقاله:
این مقاله چکیده ندارد
منابع مشابه
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 2 compression function evaluations. Furthermore, we show how the compression function attack can be extended to construct collisions for Twister-512 with complexity of about 2. 1 Description of Twister The hash function Twister is an iterated hash fu...
متن کاملtwister - a P2P microblogging platform
This paper proposes a new microblogging architecture based on peerto-peer networks overlays. The proposed platform is comprised of three mostly independent overlay networks. The first provides distributed user registration and authentication and is based on the Bitcoin protocol. The second one is a Distributed Hash Table (DHT) overlay network providing key/value storage for user resources and t...
متن کاملMersenne Twister and Fubuki Stream/block Cipher
We propose two stream ciphers based on a non-secure pseudorandom number generator (called the mother generator). The mother generator is here chosen to be the Mersenne Twister (MT), a widely used 32-bit integer generator having 19937 bits of internal state and period 219937 − 1. One proposal is CryptMT, which computes the accumulative product of the output of MT, and use the most significant 8 ...
متن کاملAnti - holomorphic twister and symplectic structure ∗ †
It is well known that the twisters, section of twister space, classify the almost complex structure on even dimensional Riemannian manifold X. We will show that existence of a harmonic and anti-holomorphic twister is equivalent to having a symplectic structure on X
متن کاملTwister Generator of Arbitrary Uniform Sequences
Twisting generators for pseudorandom numbers may use a congruential array to simulate stochastic sequences. Typically, the computer program controls the quantity of elements in array to limit the random access memory. This technique may have limitations in situations where the stochastic sequences have an insufficient size for some application tasks, ranging from theoretical mathematics and tec...
متن کاملMersenne twister-based RFID authentication protocol
This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for radio-frequency identification (RFID) tags. The proposed scheme is more secure than its predecessors. The vulnerabilities of previous schemes based on triangular functions and rotation have been demonstrated in traditional and rotational cryptanalysis. In this paper, we summarize the successful attacks on...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 1383 شماره 10
صفحات 12- 13
تاریخ انتشار 2004-05
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی برای این مقاله ارائه نشده است
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023