نتایج جستجو برای: cayley hash function

تعداد نتایج: 1221998  

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2023

The CGL hash function is a provably secure using walks on isogeny graphs of supersingular elliptic curves. A dominant cost its computation comes from iterative computations power roots over quadratic extension fields. In this paper, we reduce the necessary number root by almost half, applying and also extending an existing method efficient sequence Legendre curves (Hashimoto Nuida, CASC 2021). ...

2000
VÁCLAV SKALA MARTIN KUCHAŘ V. SKALA M. KUCHAŘ

There are many applications where data structures use a hash function. The hash data structures are widely used across all fields of computer science. Nevertheless the design or selection of hash function for data sets with unknown properties is a problem. The Rapid Prototyping uses STL format, where a set of triangles is used to represent a surface of the object. It is necessary to construct t...

2014
Farid Ablayev Marat Ablayev

We define the concept of a quantum hash generator and offer a design, which allows one to build a large number of different quantum hash functions. The construction is based on composition of a classical ǫ-universal hash family and a given family of functions – quantum hash generators. The relationship between ǫ-universal hash families and error-correcting codes give possibilities to build a la...

2005
Eric Thompson Xianyan Wang Dengguo Feng Xuejia Lai

In August 2004 at the annual cryptography conference in Santa Barbara, California a group of cryptographers, Xianyan Wang, Dengguo Feng, Xuejia Lai, and Hongbo Yu made the announcement that they had successfully generated two files with different contents that had the same MD5 hash. This paper reviews the announcement and discusses the impact this discovery may have on the use of MD5 hash funct...

2007
Scott Contini Ron Steinfeld Josef Pieprzyk Krystian Matusiewicz

The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.

Journal: :IACR Cryptology ePrint Archive 2015
Jian Zou Le Dong

The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is designed to replace the old Independent States (CIS) standard GOST 34.311-95. The Kupyna hash function is an AES-based primitive, which uses Merkle-Damg̊ard compression function based on Even-Mansour design. In this paper, we show the first cryptanalytic attacks on the round-reduced Kupyna hash func...

Journal: :IACR Cryptology ePrint Archive 2015
Yuval Yarom Qian Ge Fangfei Liu Ruby B. Lee Gernot Heiser

Modern Intel processors use an undisclosed hash function to map memory lines into last-level cache slices. In this work we develop a technique for reverse-engineering the hash function. We apply the technique to a 6-core Intel processor and demonstrate that knowledge of this hash function can facilitate cache-based side channel attacks, reducing the amount of work required for profiling the cac...

2009
Václav Snásel Ajith Abraham Jiri Dvorský Pavel Krömer Jan Platos

In this article we discuss a simple hash function based upon properties of a well-known combinatorial design called quasigroups. The quasigroups are equivalent to the more familiar Latin squares and one of their most important properties is that all possible element of certain quasigroup occurs with equal probability. Actual implementations are based on look-up table implementation of the quasi...

Journal: :International Journal of Networking and Computing 2019

Journal: :CSRID (Computer Science Research and Its Development Journal) 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید