Results 101 to 110 of about 39,607 (176)

On quantum preimage attacks

open access: yes, 2014
We propose a preimage attack against cryptographic hash functions based on the speedup enabled by quantum computing. Preimage resistance is a fundamental property cryptographic hash functions must possess. The motivation behind this work relies in the lack of conventional attacks against newly introduced hash schemes such as the recently elected SHA-3 ...
openaire   +3 more sources

Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]

open access: yesIACR Transactions on Symmetric Cryptology
Recently, linear structures and algebraic attacks have been widely used in preimage attacks on round-reduced Keccak. Inherited by pioneers’ work, we make some improvements for 3-round Keccak-256 and 4-round Keccak[r=640, c=160].
Xiaoen Lin, Le He, Hongbo Yu
doaj   +1 more source

A Second Preimage Attack on the XOR Hash Combiner

open access: yesIET Information Security
The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1.
Shiwei Chen   +3 more
doaj   +1 more source

Topological solitonic macromolecules. [PDF]

open access: yesNat Commun, 2023
Zhao H, Malomed BA, Smalyukh II.
europepmc   +1 more source

Genus and the Lyusternik-Schnirelmann category of preimages

open access: yesМоделирование и анализ информационных систем, 2007
In this paper some axiomatic generalization (function of open subsets) of the relative Lyusternik - Schnirelmann category is considered. For this function and a given map of the underlying space to a finite polyhedron some lower bounds on the value of ...
R. N. Karasev
doaj  

Is the Matrix Completion of Reduced Density Matrices Unique? [PDF]

open access: yesJ Phys Chem Lett
Massaccesi GE   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy