Design theory and method of multivariate hash function

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function

We illustrate how coding theory was applied in the design of the cryptographic hash function LANE [8]. The generic structure of the LANE compression function could potentially be vulnerable to a class of meet-in-the-middle attacks. While difficult to avoid at first sight, restating the problem in the domain of error correcting codes naturally leads to a simple and elegant solution. This ensures...

متن کامل

An Improved Hash Function Based on the Tillich-Zémor Hash Function

Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.

متن کامل

A Mathematical Theory of Hash Function

This paper provide some property of Incompressible String and the new construction of hash function.

متن کامل

Analysis of Multivariate Hash Functions

We analyse the security of new hash functions whose compression function is explicitly defined as a sequence of multivariate equations. First we prove non-universality of certain proposals with sparse equations, and deduce trivial collisions holding with high probability. Then we introduce a method inspired from coding theory for solving underdefined systems with a low density of non-linear mon...

متن کامل

Phase mask generation for DRPE method using chaos theory and hash function

The aim of this paper is to increase security of double random phase encoding (DRPE) method using chaos theory and hash function for phase mask generation. DRPE encodes the input image by the use of two keys which are random phase masks. Having these keys, the original image can be easily obtained with the reverse process, called decoding. To enhance the system’s security, instead of sending ra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2010

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-010-4062-1