军事学 >>> 军事学 >>> 军事理论 军事史 军事心理学 战略学 战役学 战术学 军队指挥学 军制学 军队政治工作学 军事后勤学 军事地学 军事技术 军事学其他学科 军事学其他学科
搜索结果: 1-12 共查到军事学 Skein相关记录12条 . 查询时间(0.109 秒)
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA     BLAKE  Threefish  Skein on FPGA       font style='font-size:12px;'> 2013/4/18
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithm...
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family     secret-key cryptography       font style='font-size:12px;'> 2012/3/28
We present the new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions. The new tool has prov...
We introduce a new concept in splice-and-cut attacks on hash functions, which bridges the gap between preimage attacks and a powerful method of differential cryptanalysis. The new concept is called bi...
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256     Hash function  Skein  SHA-3       font style='font-size:12px;'> 2012/3/29
The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation ...
In this paper we combine the recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approa...
Recently, cryptanalysts have found collisions on the MD4, MD5, and SHA-0 algorithms; moreover, a method for finding SHA–1 collisions with less than the expected amount of work complexity has been publ...
The SHA-3 competition organized by NIST aims to find a new hash standard as a replacement of SHA-2. Till now, 14 submissions have been selected as the second round candidates, including Skein and BLAK...
In this paper we describe our high-speed hardware implementations of the 14 candidates of the second evaluation round of the SHA-3 hash function competition. We synthesized all implementations usin...
Improved Cryptanalysis of Skein     Improved Cryptanalysis  Skein       font style='font-size:12px;'> 2009/9/27
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the first third-party analy...
Improved Cryptanalysis of Skein     Improved Cryptanalysis  Skein       font style='font-size:12px;'> 2009/9/22
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the first third-party analy...
The weakening of the widely used SHA-1 hash function has also cast doubts on the strength of the related algorithms of the SHA-2 family. The US NIST has therefore initiated the SHA-3 competition in...
Hardware Implementation of the SHA-3 Candidate Skein     SHA-3  Skein  high-speed  hardware       font style='font-size:12px;'> 2009/6/12
Skein is a submission to the NIST SHA-3 hash function com- petition which has been optimized towards implementation in modern 64-bit processor architectures. This paper investigates the performance ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...