Results 61 to 70 of about 1,402 (165)
Generic Attacks on Double Block Length Sponge Hashing
The sponge construction is one of the main modes of operation for hash functions. Using a permutation of width b = r + c, the sponge construction with rate r and capacity c is indifferentiable up to Ω(2c/2) permutation calls.
Gaëtan Leurent, César Mathéus
doaj +1 more source
ABSTRACT Orogenic wedges juxtapose tectonic units that originated far from each other, and tracing these back to their origin is often difficult. We have studied two contrasting serpentinite–sediment associations of the Alpine‐Apennine orogenic wedge of eastern Elba Island with the help of a detrital zircon study of the sediments and a geochemical ...
Joachim Jacobs +4 more
wiley +1 more source
MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph +2 more
core +2 more sources
LRPS‐GCN: A millimeter wave sparse imaging algorithm based on graph signal
To address the slow speed and poor accuracy issues of traditional millimeter wave sparse imaging, a novel sparse imaging algorithm based on graph convolution model is introduced, utilising low‐rank and piecewise smoothing regular terms to construct the graph signal model and employing a denoising graph convolution network for sparse reconstruction ...
Li Che +3 more
wiley +1 more source
The related-key analysis of feistel constructions [PDF]
Lecture Notes in Computer Science, Volume 8540, 2015.It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosen-ciphertext attacks, respectively.
A Biryukov +34 more
core +1 more source
The role of viruses in oral mucosal lesions
Abstract The mucosa of the oral cavity is exposed to a large number of different microorganisms such as archaea, bacteria, fungi, parasites, and viruses. Among those, viruses cause specific infections, which can easily be transmitted from one person to another.
Henrik Dommisch +1 more
wiley +1 more source
Post-quantum security of hash functions [PDF]
The research covered in this thesis is dedicated to provable post-quantum security of hash functions. Post-quantum security provides security guarantees against quantum attackers.
Czajkowski, J.M.
core +2 more sources
Indifferentiable Hashing to Barreto–Naehrig Curves [PDF]
A number of recent works have considered the problem of constructing constant-time hash functions to various families of elliptic curves over finite fields. In the relevant literature, it has been occasionally asserted that constant-time hashing to certain special elliptic curves, in particular so-called BN elliptic curves, was an open problem.
Fouque, Pierre-Alain, Tibouchi, Mehdi
openaire +2 more sources
Cheon's anholonomies in Floquet operators
Anholonomies in the parametric dependences of the eigenvalues and the eigenvectors of Floquet operators that describe unit time evolutions of periodically driven systems, e.g., kicked rotors, are studied.
A. Bohm +9 more
core +1 more source
Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3 [PDF]
Discussions about the choice of a tree hash mode of operation for a standardization have recently been undertaken. It appears that a single tree mode cannot address adequately all possible uses and specifications of a system. In this paper, we review the
Atighehchi, Kevin, Bonnecaze, Alexis
core +3 more sources

