نتایج جستجو برای: mutamid 256
تعداد نتایج: 12691 فیلتر نتایج به سال:
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the fastest submitted hash functions. In our attack, we show weaknesses in the message injection and state update of SHAMATA. It is possible to find certain message differences that do not get changed by the message expan...
NESHA-256 is a cryptographic hash function designed by Esmaeili et al. and presented at WCC ’09. We show that NESHA-256 is highly insecure.
In this note, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function evaluations. Second, we invalidate the preimage security claim for Haraka-512/256 with an attack finding one preimage in about 2192 function evaluations. Th...
A CMOS imager is presented which has the ability to perform localized compressive sensing on-chip. In-pixel convolutions of the sensed image with measurement matrices are computed in real time, and a proposed programmable twodimensional scrambling technique guarantees the randomness of the coefficients used in successive observation. A power and areaefficient implementation architecture is pres...
The Kalyna block cipher has recently been established as the Ukranian encryption standard in June, 2015. It was selected in a Ukrainian National Public Cryptographic Competition running from 2007 to 2010. Kalyna supports block sizes and key lengths of 128, 256 and 512 bits. Denoting the variants of Kalyna as Kalyna-b/k, where b denotes the block size and k denotes the keylength, the design spec...
9 pm Cutoff 256 x 256 GaAslAlxGal - xAs Quantum Well Infrared Photodetector Focal Plane Array Camera
There are several applications that require long wavelength, large, uniform, reproducible, low cost, low 1/f noise, low power dissipation, and radiation hard infrared (IR) focal plane arrays (FPAs). For example, the absorption lines of many gas molecules, such as ozone, water, carbon monoxide, carbon dioxide, and nitrous oxide occur in the wavelength region from 3 to 18 pm. Thus, IR imaging sys...
We study the security of hash-then-publish time-stamping schemes and concentrate on the tightness of security reductions from the collision-resistance of the underlying hash functions. While the previous security reductions create a quadratic loss in the security in terms of time-success ratio of the adversary being protected against, this paper achieves a notably smaller loss of power 1.5. Thi...
This paper proposes the t-class of SOBER stream ciphers: t8, t16 and t32. t8, t16 and t32 offer 64-, 128and 256-bit key strength respectively. The t-class ciphers are based on the same principles as the original SOBER family: SOBER [17], SOBER-II [18], S16 and S32 [19], utilising the structure SOBER-II and S16 are based. The t-class ciphers are software stream ciphers designed for software impl...
Stream cipher HC-256 is proposed in this paper. It generates keystream from a 256-bit secret key and a 256-bit initialization vector. HC-256 consists of two secret tables, each one with 1024 32-bit elements. The two tables are used as S-Box alternatively. At each step one element of a table is updated and one 32-bit output is generated. The encryption speed of the C implementation of HC-256 is ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید