咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 18 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 40 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 38 篇 工学
    • 31 篇 计算机科学与技术...
    • 16 篇 电气工程
    • 8 篇 电子科学与技术(可...
    • 5 篇 信息与通信工程
    • 5 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 船舶与海洋工程
  • 8 篇 理学
    • 7 篇 数学
    • 1 篇 物理学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 40 篇 compression func...
  • 21 篇 hash function
  • 5 篇 collision resist...
  • 4 篇 cryptography
  • 3 篇 semi-free-start ...
  • 3 篇 distinguisher
  • 3 篇 authenticated en...
  • 3 篇 cryptanalysis
  • 3 篇 provable securit...
  • 3 篇 indifferentiabil...
  • 2 篇 second preimage ...
  • 2 篇 collision
  • 2 篇 domain extension
  • 2 篇 vector-input prf
  • 2 篇 preimage resista...
  • 2 篇 authentication
  • 2 篇 merkle-damgard
  • 2 篇 security
  • 2 篇 blockcipher
  • 2 篇 parallel structu...

机构

  • 2 篇 shenzhen univ co...
  • 2 篇 japan sci & tech...
  • 2 篇 osaka univ grad ...
  • 2 篇 nanyang technol ...
  • 2 篇 univ fukui fac e...
  • 2 篇 nanyang technol ...
  • 1 篇 ntt corp ntt inf...
  • 1 篇 heilongjiang uni...
  • 1 篇 naval univ engn ...
  • 1 篇 univ aizu div co...
  • 1 篇 east china norma...
  • 1 篇 tsinghua univ in...
  • 1 篇 kansai univ fac ...
  • 1 篇 univ victoria de...
  • 1 篇 tech univ denmar...
  • 1 篇 tech univ denmar...
  • 1 篇 tsinghua univ de...
  • 1 篇 state grid ansha...
  • 1 篇 department of in...
  • 1 篇 univ luxembourg ...

作者

  • 4 篇 gauravaram prave...
  • 3 篇 peyrin thomas
  • 3 篇 miyaji atsuko
  • 3 篇 su chunhua
  • 3 篇 hirose shoichi
  • 3 篇 mazumder rashed
  • 2 篇 kuwakado hidenor...
  • 2 篇 yang yijun
  • 2 篇 wang gaoli
  • 2 篇 naderi majid
  • 2 篇 bagheri nasour
  • 2 篇 knudsen lars r.
  • 2 篇 sadeghiyan babak
  • 2 篇 mendel florian
  • 1 篇 li junqing
  • 1 篇 he xianhong
  • 1 篇 yasuda kan
  • 1 篇 wang lei
  • 1 篇 wu wenling
  • 1 篇 iwamoto mitsugu

语言

  • 39 篇 英文
  • 1 篇 其他
检索条件"主题词=compression function"
40 条 记 录,以下是1-10 订阅
排序:
Weak fault detection based on amplification-compression function and sparse spike deconvolution
收藏 引用
JOURNAL OF LOW FREQUENCY NOISE VIBRATION AND ACTIVE CONTROL 2024年 第1期43卷 272-288页
作者: Zhang, Shuai Hou, Yue Li, Yanfei Liu, Shuyong Li, Jing Naval Univ Engn Power Engn Coll Wuhan Hubei Peoples R China Naval Univ Engn Jiefang Rd 717 Wuhan 430033 Hubei Peoples R China
Weak fault detection is still a hotspot in these years. The key of this work is to enhance the ratio of signal to noise (SNR). Then a new extraction method of weak fault impact based on amplification algorithm is prop... 详细信息
来源: 评论
Construction and Analysis of SHA-256 compression function Based on Chaos S-Box
收藏 引用
IEEE ACCESS 2021年 9卷 61768-61777页
作者: Wang, Juan Liu, Ge Chen, Yongqi Wang, Shu Harbin Engn Univ Coll Informat & Commun Engn Harbin 150001 Peoples R China Heilongjiang Univ Sci & Technol Coll Elect & Informat Engn Harbin 150027 Peoples R China Harbin Engn Univ Natl Sci Pk Harbin 150001 Peoples R China State Grid Anshan Elect Power Supply Co Anshan 114000 Peoples R China
To further improve the security of SHA-256, a compression function construction scheme based on chaotic S-box is proposed. Through the reasonable design of the iteration mode and using the nonlinearity, confusion, and... 详细信息
来源: 评论
The PRF Security of compression-function-Based MAC functions in the Multi-User Setting
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2019年 第1期E102A卷 270-277页
作者: Hirose, Shoichi Univ Fukui Fac Engn Fukui 9108507 Japan
A compression-function-based MAC function called FMAC was presented as well as a vector-input PRF called vFMAC in 2016. They were proven to be secure PRFs on the assumption that their compression function is a secure ... 详细信息
来源: 评论
A Tweak for a PRF Mode of a compression function and Its Applications  1
收藏 引用
9th International Conference on Security for Information Technology and Communications (SECITC)
作者: Hirose, Shoichi Yabumoto, Atsushi Univ Fukui Fac Engn Fukui Japan Univ Fukui Grad Sch Engn Fukui Japan
We discuss a tweak for the domain extension called Merkle-Damgard with Permutation (MDP), which was presented at ASI-ACRYPT 2007. We first show that MDP may produce multiple independent pseudorandom functions (PRFs) u... 详细信息
来源: 评论
Quantum Collision Resistance of Double-Block-Length Hashing
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2024年 第9期E107A卷 1478-1487页
作者: Hirose, Shoichi Kuwakado, Hidenori Univ Fukui Fac Engn Fukui 9108507 Japan Kansai Univ Fac Informat Takatsuki 5691095 Japan
In 2005, Nandi introduced a class of double-block-length compression functions h pi(x) pi ( x ) := = ( h ( x ) , h("(x))), ( " ( x ))) , where h is a random oracle with an n-bit output and " is a non-cr... 详细信息
来源: 评论
Novel cryptographic hash function based on multiple compressive parallel structures
收藏 引用
SOFT COMPUTING 2022年 第24期26卷 13233-13248页
作者: Yang, Yijun Tian, Xi Pei, Pei He, Xianhong Zhang, Xiayan Shenzhen Polytech Sch Artificial Intelligence Shenzhen 518060 Guangdong Peoples R China Shenzhen Univ Coll Comp & Software Engn Shenzhen 518060 Guangdong Peoples R China
As a fundamental cryptographic primitive, hash function is used in various cryptographic applications, such as cloud storage, digital signature, block chain and random number generation. Although hash function has mad... 详细信息
来源: 评论
Preimage Awareness in Linicrypt  36
Preimage Awareness in Linicrypt
收藏 引用
IEEE 36th Computer Security Foundations Symposium (CSF)
作者: Javar, Zahra Kapron, Bruce M. Univ Victoria Dept Comp Sci Victoria BC Canada
We extend the analysis of collision-resistant hash functions in the Linicrypt model presented by McQuoid, Swope & Rosulek (TCC 2019) in order to characterize preimage awareness, a security property defined by Dodi... 详细信息
来源: 评论
A secure hash function based on feedback iterative structure
收藏 引用
ENTERPRISE INFORMATION SYSTEMS 2019年 第3期13卷 281-302页
作者: Yang, Yijun Chen, Fei Chen, Jianyong Zhang, Yong Yung, Kai Leung Shenzhen Univ Coll Comp & Software Engn Shenzhen Guangdong Peoples R China Shenzhen Univ Coll Optoelect Engn Minist Educ & Guangdong Prov Key Lab Optoelect Devices & Syst Shenzhen Guangdong Peoples R China Shenzhen Polytech Coll Comp & Software Engn Shenzhen Guangdong Peoples R China Shenzhen Univ ATR Key Lab Natl Def Technol Shenzhen 518060 Guangdong Peoples R China Hong Kong Polytech Univ Dept Ind & Syst Engn Hong Kong Peoples R China
Rapid growth of internet data has created enormous security challenges on authenticity, availability and integrity protection of these outsourced data. Hash function is one of the main solutions to face these challeng... 详细信息
来源: 评论
compression function DESIGN OF SECURE HASH ALGORITHM BASED ON BLOCK CIPHER
COMPRESSION FUNCTION DESIGN OF SECURE HASH ALGORITHM BASED O...
收藏 引用
IET International Conference on Information Science and Control Engineering
作者: Jia Yu Bo Ren The School of Computer Science Northwestern Polytechnical University The Department of Computer Science Luoyang Institute of Science and Techonology
The basic criteria of a secure hash algorithm were analyzed for resisting the brute-force and cryptanalysis attacks. The finite field operations and the structures of the strong symmetric block cipher were studied. Th... 详细信息
来源: 评论
Provably Secure Authenticated Encryption
Provably Secure Authenticated Encryption
收藏 引用
作者: Damian VIZAR ECOLE POLYTECHNIQUE FEDERALE DE LAUSANNE
学位级别:博士
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research of AE as a primitive in its own right started... 详细信息
来源: 评论