Caligo, an Extensible Block Cipher -and- CHash, a Caligo Based Hash
نویسنده
چکیده
The Caligo operations are performed on whole blocks only. No subdivision passes through an s-box or a Feistel network. The cipher definition is the same for any block size, allowing exhaustive search for statistical deviations on small block variants. I also propose CHash, a hash function that takes advantage of the cipher extensibility and resists the extension attack.
منابع مشابه
Evaluation of widely used models for predicting BRCA1 and BRCA2 mutations.
F Marroni, P Aretini, E D’Andrea, M A Caligo, L Cortesi, A Viel, E Ricevuto, M Montagna, G Cipollini, S Ferrari, M Santarosa, R Bisegna, J E Bailey-Wilson, G Bevilacqua, G Parmigiani, S Presciuttini . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
متن کاملLETTER TO JMG Evaluation of widely used models for predicting BRCA1 and BRCA2 mutations
F Marroni, P Aretini, E D’Andrea, M A Caligo, L Cortesi, A Viel, E Ricevuto, M Montagna, G Cipollini, S Ferrari, M Santarosa, R Bisegna, J E Bailey-Wilson, G Bevilacqua, G Parmigiani, S Presciuttini . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
متن کاملThe Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method
This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol. EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an EAP server. It supports authentication techniques that are based on passwords, high-entropy shared keys, and public key certificates. EAP-IKEv2 further ...
متن کاملVisual sensitivity in the crepuscular owl butterfly Caligo memnon and the diurnal blue morpho Morpho peleides: a clue to explain the evolution of nocturnal apposition eyes?
Insects active in dim light, such as moths and many beetles, normally have superposition compound eyes to increase photon capture. But there are nocturnal and crepuscular insects - such as some species of bees, wasps and butterflies - that have apposition compound eyes. These are likely to have adaptations - including large eye and facet size and coarsened spatial and temporal resolution - that...
متن کاملEfficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function
This article discusses the provable security of pseudorandom-function (PRF) modes of an iterated hash function using a block cipher. The iterated hash function uses the Matyas-Meyer-Oseas (MMO) mode for the compression function and the Merkle-Damgård with a permutation (MDP) for the domain extension transform. It is shown that the keyed-via-IV mode and the key-prefix mode of the iterated hash f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006