Results 1 to 10 of about 39,607 (176)
Implementation and Optimization of Zero-Knowledge Proof Circuit Based on Hash Function SM3 [PDF]
With the increasing demand for privacy protection in the blockchain, the universal zero-knowledge proof protocol has been developed and widely used. Because hash function is an important cryptographic primitive in a blockchain, the zero-knowledge proof ...
Yang Yang +7 more
doaj +2 more sources
Improved MITM Cryptanalysis on Streebog
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua +5 more
doaj +1 more source
Preimage homomorphism indices of preimage classes
Under finite regular covering spaces, each preimage class of the base spaces is covered by some preimage classes of the covering spaces. In this paper the authors find an explicit relationship between the preimage classes under finite regular covering spaces in terms of covering transformation groups.
Ha, Ku Yong, Lee, Jong Bum
openaire +2 more sources
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023). In this paper, we focus on preimage attacks against round-reduced Ascon.
Huina Li +4 more
doaj +1 more source
Predictive analysis of two bijectively related families of functions in L2, which are expressed as tuple pairs [PDF]
This article proposes a method of function image prediction calculation by its preimage. This method is based on regression analysis of function image and preimage pairs in L2. The prediction model application procedure is described.
Mosin V G, Abashkin A. A.
doaj +1 more source
Digital plane preimage structure [PDF]
Abstract In digital geometry, digital straightness is an important concept both for practical motivations and theoretical interests. Concerning the digital straightness in dimension 2, many digital straight line characterizations exist and the digital straight segment preimage is well known.
Coeurjolly, David +4 more
openaire +2 more sources
Improved Preimage Attacks on 4-Round Keccak-224/256
This paper provides an improved preimage attack method on standard 4-round Keccak-224/256. The method is based on the work pioneered by Li and Sun, who design a linear structure of 2-round Keccak-224/256 with 194 degrees of freedom left.
Le He, Xiaoen Lin, Hongbo Yu
doaj +1 more source
Preimage problems for deterministic finite automata [PDF]
Given a subset of states $S$ of a deterministic finite automaton and a word $w$, the preimage is the subset of all states mapped to a state in $S$ by the action of $w$. We study three natural problems concerning words giving certain preimages.
Berlinkov, Mikhail V. +2 more
core +1 more source
Preimages under the Bubblesort Operator
We study preimages of permutations under the bubblesort operator $\mathbf{B}$. We achieve a description of these preimages much more complete than what is known for the more complicated sorting operators $\mathbf{S}$ (stacksort) and $\mathbf{Q}$ (queuesort).
Mathilde Bouvel +2 more
openaire +6 more sources
Preimage cardinalities of continuous functions [PDF]
4 figures (another figure added)
openaire +2 more sources

