咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 9 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程
  • 2 篇 理学
    • 2 篇 数学

主题

  • 9 篇 compression func...
  • 6 篇 hash functions
  • 2 篇 random oracle
  • 2 篇 block ciphers
  • 2 篇 collision resist...
  • 1 篇 block cipher bas...
  • 1 篇 open problems
  • 1 篇 blockcipher-base...
  • 1 篇 linearization
  • 1 篇 ideal-cipher mod...
  • 1 篇 permutation base...
  • 1 篇 generalized birt...
  • 1 篇 all-or-nothing
  • 1 篇 block cipher
  • 1 篇 computer systems...
  • 1 篇 tight reduction ...
  • 1 篇 cryptographic ha...
  • 1 篇 ranking function...
  • 1 篇 recursive functi...
  • 1 篇 reductions

机构

  • 1 篇 univ lugano luga...
  • 1 篇 tata consultancy...
  • 1 篇 tech univ eindho...
  • 1 篇 google inc 1600 ...
  • 1 篇 univ versailles ...
  • 1 篇 portland state u...
  • 1 篇 hsbc
  • 1 篇 epfl lugano
  • 1 篇 univ illinois de...
  • 1 篇 chinese acad sci...
  • 1 篇 iminds ghent
  • 1 篇 france telecom r...
  • 1 篇 univ british col...
  • 1 篇 katholieke univ ...
  • 1 篇 acad sinica inst...
  • 1 篇 chinese acad sci...
  • 1 篇 univ calif davis...
  • 1 篇 natl key lab int...
  • 1 篇 univ rochester d...
  • 1 篇 france telecom r...

作者

  • 2 篇 peyrin thomas
  • 1 篇 steinberger john
  • 1 篇 wu wenling
  • 1 篇 andreeva elena
  • 1 篇 mennink bart
  • 1 篇 peters christian...
  • 1 篇 stam martijn
  • 1 篇 qiu tian
  • 1 篇 gilbert henri
  • 1 篇 preneel bart
  • 1 篇 rogaway phillip
  • 1 篇 gauravaram prave...
  • 1 篇 bernstein daniel...
  • 1 篇 muller frederic
  • 1 篇 lange tanja
  • 1 篇 rubery daniel
  • 1 篇 schwabe peter
  • 1 篇 shrimpton thomas
  • 1 篇 wu chuankun
  • 1 篇 hemaspaandra lan...

语言

  • 9 篇 英文
检索条件"主题词=Compression functions"
9 条 记 录,以下是1-10 订阅
排序:
Combining compression functions and block cipher-based hash functions
Combining compression functions and block cipher-based hash ...
收藏 引用
12th International Conference on the Theory of Application of Cryptology and Information Security
作者: Peyrin, Thomas Gilbert, Henri Muller, Frederic Robshaw, Matt France Telecom R&D Issy Les Moulineaux France HSBC Paris France
The design of secure compression functions is of vital importance to hash function development. In this paper we consider the problem of combining smaller trusted compression functions to build a larger compression fu... 详细信息
来源: 评论
Open problems in hash function security
收藏 引用
DESIGNS CODES AND CRYPTOGRAPHY 2015年 第2-3期77卷 611-631页
作者: Andreeva, Elena Mennink, Bart Preneel, Bart Katholieke Univ Leuven Dept Elect Engn ESAT COSIC Leuven Belgium iMinds Ghent Belgium
A cryptographic hash function compresses arbitrarily long messages to digests of a short and fixed length. Most of existing hash functions are designed to evaluate a compression function with a finite domain in a mode... 详细信息
来源: 评论
Recursion-theoretic ranking and compression
收藏 引用
JOURNAL OF COMPUTER AND SYSTEM SCIENCES 2019年 101卷 31-41页
作者: Hemaspaandra, Lane A. Rubery, Daniel Univ Rochester Dept Comp Sci 601 Elmwood Ave Rochester NY 14627 USA Google Inc 1600 Amphitheatre Pkwy Mountain View CA 94043 USA
For which sets A does there exist a mapping, computed by a total or partial recursive function, such that the mapping, when its domain is restricted to A, is a 1-to-1, onto mapping to Sigma*? For which sets A does the... 详细信息
来源: 评论
Analysis of all-or-nothing hash functions
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2008年 第5期24卷 1473-1484页
作者: Lin, Pin Wu, Wenling Wu, Chuankun Qiu, Tian Chinese Acad Sci Inst Software State Key Lab Informat Secur Beijing 100190 Peoples R China Natl Key Lab Integrated Informat Syst Technol Beijing 100190 Peoples R China Chinese Acad Sci Grad Sch Beijing 100190 Peoples R China
The most popular method to construct hash functions is to iterate a compression function on the input message. This method is called Merkle-Damgard method. Most hash functions used in practice such as MD4, MD5, SHA-0,... 详细信息
来源: 评论
Constructing cryptographic hash functions from fixed-key blockciphers  1
收藏 引用
28th Annual International Cryptology Conference
作者: Rogaway, Phillip Steinberger, John Univ Calif Davis Dept Comp Sci Davis CA 95616 USA Univ British Columbia Dept Math Vancouver BC V5Z 1M9 Canada
We propose a family of compression functions built from fixed-key blockciphers and investigate their collision and preimage security in the ideal-cipher model. The constructions have security approaching and in many c... 详细信息
来源: 评论
Really Fast Syndrome-Based Hashing
收藏 引用
4th International Conference on the Theory and Application of Cryptographic Techniques in Africa (AFRICACRYPT)
作者: Bernstein, Daniel J. Lange, Tanja Peters, Christiane Schwabe, Peter Univ Illinois Dept Comp Sci Chicago IL 60607 USA Tech Univ Eindhoven Dept Math & Comp Sci NL-5600 MB Eindhoven Netherlands Acad Sinica Inst Informat Sci Taipei 11529 Taiwan
The FSB (fast syndrome-based) hash function was submitted to the SHA-3 competition by Augot, Finiasz, Gaborit, Manuel, and Sendrier in 2008, after preliminary designs proposed in 2003, 2005, and 2007. Many FSB paramet... 详细信息
来源: 评论
Security analysis of salt ∥ password hashes
Security analysis of salt ∥ password hashes
收藏 引用
International Conference on Advanced Computer Science Applications and Technologies (ACSAT)
作者: Gauravaram, Praveen Tata Consultancy Serv Ltd Tata Consultancy Serv Innovat Labs Hyderabad Andhra Pradesh India
Protection of passwords used to authenticate computer systems and networks is one of the most important application of cryptographic hash functions. Due to the application of precomputed memory look up attacks such as... 详细信息
来源: 评论
Security analysis of constructions combining FIL random oracles
收藏 引用
14th International Workshop on Fast Software Encryption
作者: Seurin, Yannick Peyrin, Thomas France Telecom R&D 38-40 Rue Gen Leclerc F-92794 Issy Les Moulineaux France Univ Versailles Versailles France
We consider the security of compression functions built by combining smaller perfectly secure compression functions modeled as fixed input length random oracles. We give tight security bounds and generic attacks for v... 详细信息
来源: 评论
Building a collision-resistant compression function from non-compressing primitives (extended abstract)
Building a collision-resistant compression function from non...
收藏 引用
35th International Colloquium on Automata, Languages and Programming
作者: Shrimpton, Thomas Stam, Martijn Univ Lugano Lugano Switzerland Portland State Univ Lugano Switzerland EPFL Lugano Switzerland
We consider how to build an efficient compression function from a small number of random, non-compressing primitives. Our main goal is to achieve a level of collision resistance as close as possible to the optimal bir... 详细信息
来源: 评论