咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 18 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 40 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 38 篇 工学
    • 31 篇 计算机科学与技术...
    • 16 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 信息与通信工程
    • 5 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 船舶与海洋工程
  • 8 篇 理学
    • 7 篇 数学
    • 1 篇 物理学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 40 篇 compression func...
  • 21 篇 hash function
  • 5 篇 collision resist...
  • 4 篇 cryptography
  • 3 篇 semi-free-start ...
  • 3 篇 distinguisher
  • 3 篇 authenticated en...
  • 3 篇 cryptanalysis
  • 3 篇 provable securit...
  • 3 篇 indifferentiabil...
  • 2 篇 second preimage ...
  • 2 篇 collision
  • 2 篇 domain extension
  • 2 篇 vector-input prf
  • 2 篇 preimage resista...
  • 2 篇 authentication
  • 2 篇 merkle-damgard
  • 2 篇 security
  • 2 篇 blockcipher
  • 2 篇 parallel structu...

机构

  • 2 篇 shenzhen univ co...
  • 2 篇 japan sci & tech...
  • 2 篇 osaka univ grad ...
  • 2 篇 nanyang technol ...
  • 2 篇 univ fukui fac e...
  • 2 篇 nanyang technol ...
  • 1 篇 ntt corp ntt inf...
  • 1 篇 heilongjiang uni...
  • 1 篇 naval univ engn ...
  • 1 篇 univ aizu div co...
  • 1 篇 east china norma...
  • 1 篇 tsinghua univ in...
  • 1 篇 kansai univ fac ...
  • 1 篇 univ victoria de...
  • 1 篇 tech univ denmar...
  • 1 篇 tech univ denmar...
  • 1 篇 tsinghua univ de...
  • 1 篇 state grid ansha...
  • 1 篇 department of in...
  • 1 篇 univ luxembourg ...

作者

  • 4 篇 gauravaram prave...
  • 3 篇 peyrin thomas
  • 3 篇 miyaji atsuko
  • 3 篇 su chunhua
  • 3 篇 hirose shoichi
  • 3 篇 mazumder rashed
  • 2 篇 kuwakado hidenor...
  • 2 篇 yang yijun
  • 2 篇 wang gaoli
  • 2 篇 naderi majid
  • 2 篇 bagheri nasour
  • 2 篇 knudsen lars r.
  • 2 篇 sadeghiyan babak
  • 2 篇 mendel florian
  • 1 篇 li junqing
  • 1 篇 he xianhong
  • 1 篇 yasuda kan
  • 1 篇 wang lei
  • 1 篇 wu wenling
  • 1 篇 iwamoto mitsugu

语言

  • 39 篇 英文
  • 1 篇 其他
检索条件"主题词=Compression Function"
40 条 记 录,以下是21-30 订阅
排序:
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256
收藏 引用
IET INFORMATION SECURITY 2015年 第3期9卷 167-178页
作者: Bai, Dongxia Yu, Hongbo Wang, Gaoli Wang, Xiaoyun Tsinghua Univ Dept Comp Sci & Technol Beijing 100084 Peoples R China Donghua Univ Sch Comp Sci & Technol Shanghai 201620 Peoples R China Tsinghua Univ Inst Adv Study Beijing 100084 Peoples R China Shandong Univ Minist Educ Key Lab Cryptol Technol & Informat Secur Jinan 250100 Peoples R China Shandong Univ Sch Math Jinan 250100 Peoples R China
In this study, the authors study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by Wang et al. and published by Chinese Commercial Cryptography Administration Office for the... 详细信息
来源: 评论
Watch your constants: malicious Streebog
收藏 引用
IET INFORMATION SECURITY 2015年 第6期9卷 328-333页
作者: AlTawy, Riham Youssef, Amr M. Concordia Univ Concordia Inst Informat Syst Engn Montreal PQ Canada
In August 2012, the Streebog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012). In this study, the authors investigate the new standard in the context of malicious hashing a... 详细信息
来源: 评论
Counter-bDM: A Provably Secure Family of Multi-Block-Length compression functions
Counter-<i>b</i>DM: A Provably Secure Family of Multi-Block-...
收藏 引用
7th International Conference on Cryptology in Africa (AFRICACRYPT)
作者: Abed, Farzaneh Forler, Christian List, Eik Lucks, Stefan Wenzel, Jakob Bauhaus Univ Weimar Weimar Germany
Block-cipher-based compression functions serve an important purpose in cryptography since they allow to turn a given block cipher into a one-way hash function. While there are a number of secure double-block-length co... 详细信息
来源: 评论
Rotational Rebound Attacks on Reduced Skein
收藏 引用
JOURNAL OF CRYPTOLOGY 2014年 第3期27卷 452-479页
作者: Khovratovich, Dmitry Nikolic, Ivica Rechberger, Christian Univ Luxembourg Luxembourg Luxembourg Nanyang Technol Univ Singapore 639798 Singapore DTU Lyngby Denmark
In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addit... 详细信息
来源: 评论
PAPR Reduction of OFDM Signals using Adaptive Companding Scheme
PAPR Reduction of OFDM Signals using Adaptive Companding Sch...
收藏 引用
18th International Conference on Applied Electronics
作者: Cuteanu, Eugen-Victor Politehn Univ Dept Commun Timisoara Romania
One of the main problems of the multicarrier communication systems based on Orthogonal Frequency Division Multiplexing is the high peak-to-average power ratio of the transmitted signal. This paper presents a new adapt... 详细信息
来源: 评论
Improved Cryptanalysis of Reduced RIPEMD-160
Improved Cryptanalysis of Reduced RIPEMD-160
收藏 引用
19th International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT)
作者: Mendel, Florian Peyrin, Thomas Schlaeffer, Martin Wang, Lei Wu, Shuang Graz Univ Technol IAIK Graz Austria Nanyang Technol Univ Singapore Singapore
In this article, we propose an improved cryptanalysis of the double-branch hash function standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the potential differential paths that can ... 详细信息
来源: 评论
Limited-Birthday Distinguishers for Hash functions Collisions beyond the Birthday Bound Can Be Meaningful
Limited-Birthday Distinguishers for Hash Functions Collision...
收藏 引用
19th International Conference on Theory and Application of Cryptology and Information Security (ASIACRYPT)
作者: Iwamoto, Mitsugu Peyrin, Thomas Sasaki, Yu Univ Electrocommun Ctr Frontier Sci & Engn Chofu Tokyo Japan Nanyang Technol Univ Sch Phys & Math Sci Div Math Sci Singapore Singapore Nippon Telegraph & Tel Corp Secure Platform Labs Otemachi Japan
In this article, we investigate the use of limited-birthday distinguishers to the context of hash functions. We first provide a proper understanding of the limited-birthday problem and demonstrate its soundness by usi... 详细信息
来源: 评论
Tradeoff tables for compression functions: how to invert hash values
收藏 引用
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES 2012年 第1期20卷 57-70页
作者: Kara, Orhun Atalay, Adem TUBITAK BILGEM UEKAE Natl Res Inst Elect & Cryptol TR-41470 Gebze Kocaeli Turkey
Hash functions are one of the ubiquitous cryptographic functions used widely for various applications such as digital signatures, data integrity, authentication protocols, MAC algorithms, RNGs, etc. Hash functions are... 详细信息
来源: 评论
Security Analysis of Randomize-Hash-then-Sign Digital Signatures
收藏 引用
JOURNAL OF CRYPTOLOGY 2012年 第4期25卷 748-779页
作者: Gauravaram, Praveen Knudsen, Lars R. Tech Univ Denmark Dept Math DK-2800 Lyngby Denmark
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature scheme... 详细信息
来源: 评论
Cryptanalysis of the Reduced-Round Version of JH
Cryptanalysis of the Reduced-Round Version of JH
收藏 引用
6th International Symposium on Telecommunications (IST) with Emphasis on Information and Communication Technology
作者: Nourizadeh, Saeid Javanmardi, Mojtaba Sadeghiyan, Babak Amirkabir Univ Technol Dept Comp Engn & Informat Technol Tehran Polytech Tehran Iran
The JH hash function, introduced by Wu, is the one of the algorithms that was selected to the final round of SHA3 competition. In this paper, we are proud to present two kinds of attack on JH-512 hash function. One of... 详细信息
来源: 评论