Results 101 to 110 of about 39,607 (176)
We propose a preimage attack against cryptographic hash functions based on the speedup enabled by quantum computing. Preimage resistance is a fundamental property cryptographic hash functions must possess. The motivation behind this work relies in the lack of conventional attacks against newly introduced hash schemes such as the recently elected SHA-3 ...
openaire +3 more sources
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice. [PDF]
Li F, Yang M, Song Z, Wang P, Li G.
europepmc +1 more source
Practical Preimage Attacks on 3-Round Keccak-256 and 4-Round Keccak[r=640, c=160]
Recently, linear structures and algebraic attacks have been widely used in preimage attacks on round-reduced Keccak. Inherited by pioneers’ work, we make some improvements for 3-round Keccak-256 and 4-round Keccak[r=640, c=160].
Xiaoen Lin, Le He, Hongbo Yu
doaj +1 more source
Quantum hash function based on controlled alternate lively quantum walks. [PDF]
Hou P, Shang T, Zhang Y, Tang Y, Liu J.
europepmc +1 more source
A Second Preimage Attack on the XOR Hash Combiner
The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1.
Shiwei Chen +3 more
doaj +1 more source
Topological solitonic macromolecules. [PDF]
Zhao H, Malomed BA, Smalyukh II.
europepmc +1 more source
Genus and the Lyusternik-Schnirelmann category of preimages
In this paper some axiomatic generalization (function of open subsets) of the relative Lyusternik - Schnirelmann category is considered. For this function and a given map of the underlying space to a finite polyhedron some lower bounds on the value of ...
R. N. Karasev
doaj
Is the Matrix Completion of Reduced Density Matrices Unique? [PDF]
Massaccesi GE +6 more
europepmc +1 more source
Forward Operator Estimation in Generative Models with Kernel Transfer Operators. [PDF]
Huang Z, Chakraborty R, Singh V.
europepmc +1 more source

