军事学 >>> 军事学 >>> 军队指挥学 >>> 作战指挥 军事系统工程 军事通信学 军事情报学 密码学 军队指挥学其他学科
搜索结果: 1-11 共查到军队指挥学 Cryptographic hash functions相关记录11条 . 查询时间(0.125 秒)
Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. The most c...
Bad directions in cryptographic hash functions     symmetric cryptography  hash functions  password hashing       font style='font-size:12px;'> 2016/1/4
A 25-gigabyte “point obfuscation challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation is another name for password hashing. This paper shows t...
Recent years have witnessed an exceptional research interest in cryptographic hash functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the U.S. National Institute o...
Black-box property of Cryptographic Hash Functions     cryptographic hash function  pseudo-random oracle  black-box       font style='font-size:12px;'> 2010/12/14
We define a new black-box property for cryptographic hash function families $H:\{0,1\}^K\times\{0,1\}^*\rightarrow\{0,1\}^y$ which guarantees that for a randomly chosen hash function $H_K$ from the fa...
A ``strong'' cryptographic hash function suitable for practical applications should simultaneously satisfy many security properties, like pseudo-randomness, collision resistance and unforgeability. Th...
This paper extends the work of Rogaway and Shrimpton [6], where they formalized seven security properties: notions of preimage resistance (Pre, aPre, ePre), second-preimage resistance (Sec, aSec, eS...
In this paper we focus on the three basic security requirements for a cryptographic hash function, commonly referred as preimage, second preimage and collision resistance. We examine these security ...
Dynamic Cryptographic Hash Functions     Hash function  dynamic hash function  security parameter       font style='font-size:12px;'> 2009/1/8
We present the dynamic cryptographic hash function, a new type of hash function which takes two parameters instead of one. The additional parameter, the security parameter, specifies the internal wo...
Cryptographic hash functions from expander graphs      Cryptographic hash functions  expander graphs        font style='font-size:12px;'> 2008/10/22
We propose constructing provable collision resistant hash functions from expander graphs. As examples, we investigate two specific families of optimal expander graphs for provable hash function cons...
We have designed three fast implementations of recently proposed family of hash func- tions Edon{R. They produce message digests of length 256, 384 and 512 bits. We have de¯ned huge quasigroups ...
Cryptanalysis of a class of cryptographic hash functions     XOR-linear/additive checksums  3C  GOST  multi-block collision       font style='font-size:12px;'> 2008/8/15
We apply new cryptanalytical techniques to perform the generic multi-block multicollision,second preimage and herding attacks on the Damgard-Merkle hash functions with linear-XOR/additive checksums. T...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...