نتایج جستجو برای: cayley hash function
تعداد نتایج: 1221998 فیلتر نتایج به سال:
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the natural way, by using multiplication of elements in the (semi)group. In this paper, we focus on hashing with 2× 2 matrices over Fp. Since there are many known pairs of 2× 2 matrices over Z that generate a free m...
let $s$ be a subset of a finite group $g$. the bi-cayley graph ${rm bcay}(g,s)$ of $g$ with respect to $s$ is an undirected graph with vertex set $gtimes{1,2}$ and edge set ${{(x,1),(sx,2)}mid xin g, sin s}$. a bi-cayley graph ${rm bcay}(g,s)$ is called a bci-graph if for any bi-cayley graph ${rm bcay}(g,t)$, whenever ${rm bcay}(g,s)cong {rm bcay}(g,t)$ we have $t=gs^alpha$ for some $...
Abstract In this paper, we analyze the security of subset-resilient hash function families, which is first proposed as a requirement hash-based signature scheme called HORS. Let $${\mathcal {H}}$$ H be family functions mapping an element to subset size at most k . ( r , )-subset resilience guarantees that giv...
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید