搜索结果: 1-8 共查到“军事学 one-way hash”相关记录8条 . 查询时间(0.064 秒)
Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal
hash chains pebbling in-place algorithms
2016/1/23
We present explicit optimal binary pebbling algorithms for reversing one-way hash chains. For a hash chain of length 2k , the number of hashes performed in each output round does not exceed dk/2e, ...
Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions
predicate key encapsulation mechanism chosen-ciphertext security
2016/1/8
We present a new transformation of chosen-plaintext secure predicate encryption schemes
with public index into chosen-ciphertext secure schemes. Our construction requires only a universal
one-way ha...
Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme
self-healing group key distribution forward security backward secrecy
2015/12/24
In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for
resource-constrained wireless networks in Journal of Sensors (14(14):24358-24380, DOI: 10.3390/
s141224358...
Universal One-Way Hash Functions via Inaccessible Entropy
computational complexity cryptography hashing target collision-resistance onewayfunctions
2010/3/16
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from
any one-way function due to Rompel (STOC 1990). We give a simpler construction of UOWHFs,
which also obtains be...
Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication
One Way Hash Functions Rijndael Rounds Carry-less Multiplication
2009/6/9
We present Vortex a new family of one way hash functions that can produce message
digests of 224, 256, 384 and 512 bits. The main idea behind the design of these hash
functions is that we use well k...
Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms
One-Way Hash Algorithm Replaceable One-Way Hash Algorithm One-Way Hash Family Long Term Security
2009/3/16
One-way hash algorithms are an indispensable
tool in data security. Over the last decade or
so a number of one-way hash algorithms have
been designed and many of them have been used
in numerous ap...
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions
One-Way Hash Functions Arbitrary One-Way Functions
2009/3/5
A fundamental result in cryptography is that a digital signature scheme can be constructed
from an arbitrary one-way function. A proof of this somewhat surprising statement follows
from two results:...
Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy
digital signature message recovery forgery attack one-way hash message redundancy
2008/9/10
Digital signature schemes based on public-key cryptosystems generally permit existential forgery, except the schemes are equipped with some message formatting mechanisms, such as using hash functions ...