军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 hash function相关记录60条 . 查询时间(0.113 秒)
The Tire Pressure Monitoring System (TPMS) is used to monitor the pressure of the tires and to inform the driver of it. This equipment is mandatory for vehicles in US and EU. To ensure the security of...
复旦大学计算机科学与技术学院信息安全课件 Message authentication and Hash function
Faster Cryptographic Hash Function From Supersingular Isogeny Graphs.
Developing an approach to test cryptographic hash function implementations can be particularly difficult, and bugs can remain unnoticed for a very long time. We revisit the NIST SHA-3 hash function co...
Understanding how hash functions can be used in a sound manner within cryptographic protocols, as well as how they can be constructed in a sound manner from compression functions, are two important pr...
Spritz---a spongy RC4-like stream cipher and hash function     RC4  Spritz  stream cipher       font style='font-size:12px;'> 2016/12/10
We estimate that Spritz can produce output with about 24 cycles/byte of computation. Furthermore, our statistical tests suggest that about 281281 bytes of output are needed before one can reasonably d...
Recently a novel family of braid based cryptographic hash function candidates was published, claiming to be suitable for use in low resource environments. It was shown that the new hash function fam...
A Fast Single-Key Two-Level Universal Hash Function     universal hash function  Horner's rule  BRW polynomials       font style='font-size:12px;'> 2016/12/7
Universal hash functions based on univariate polynomials are well known, e.g. \sym{Poly1305} and \sym{GHASH}. Using Horner's rule to evaluate such hash functions require Г−1Г−1 field multi...
Hash-Function based PRFs: AMAC and its Multi-User Security     Hash functions  MACs  PRFs       font style='font-size:12px;'> 2016/2/23
AMAC is a simple and fast candidate construction of a PRF from an MD-style hash function which applies the keyed hash function and then a cheap, un-keyed output transform such as truncation. Spurred...
Neeva: A Lightweight Hash Function     Hash function  Lightweight cryptography  Present       font style='font-size:12px;'> 2016/1/27
RFID technology is one of the major applications of lightweight cryptography where security and cost both are equally essential or we may say that cost friendly cryptographic tools have given more w...
New Way to Construct Cryptographic Hash Function     hash function  uncertain  one-wayness       font style='font-size:12px;'> 2016/1/25
In this paper, a new way to construct cryptographic hash function is given. The cryptographic hash function is generalized to uncertain function which has various specific function forms. When compu...
The GOST hash function family has served as the new Russian national hash standard (GOST R 34.11-2012) since January 1, 2013, and it has two members, i.e., GOST- 256 and GOST-512 which correspond to...
The Hash Function "Fugue"     Fugue  compression function       font style='font-size:12px;'> 2016/1/9
We describe Fugue, a hash function supporting inputs of length upto 264 − 1 bits and hash outputs of length upto 512 bits. Notably, Fugue is not based on a compression function. Rather, it is ...
Streebog is a new Russian hash function standard. It follows the HAIFA framework as domain extension algorithm and claims to resist recent generic second-preimage attacks with long messages. However, ...
Neven, Smart and Warinschi (NSW) proved, in the generic group model, that full-length Schnorr signatures require only random-prefix resistant hash functions to resist passive existential forgery.

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...