نتایج جستجو برای: the tillich zemor hash function

تعداد نتایج: 16181744  

2000
Rainer Steinwandt Markus Grassl Willi Geiselmann Thomas Beth

We show that for various choices of the parameters in the SL2(IF2n) hashing scheme, suggested by Tillich and Zémor, messages can be modified without changing the hash value. Moreover, examples of hash functions “with a trapdoor” within this family are given. Due to these weaknesses one should impose at least certain restrictions on the allowed parameter values when using the SL2(IF2n) hashing s...

2012
Ciaran Mullan E. F. Robertson C. M. Roney-Dougal

Group-based cryptography is concerned with the role of nonabelian groups in cryptography. Since its origins in the 1980s, there have been numerous cryptographic proposals based on nonabelian groups, many of which have been broken. This thesis adds to the cryptanalytic literature by demonstrating the insecurity of several group-based cryptosystems. We cryptanalyse several key establishment proto...

Journal: :Journal of Mathematical Cryptology 2020

Journal: :CoRR 2018
Hamed Hassani Shrinivas Kudekar Or Ordentlich Yury Polyanskiy Rüdiger L. Urbanke

Consider a binary linear code of length N , minimum distance dmin, transmission over the binary erasure channel with parameter 0 < ǫ < 1 or the binary symmetric channel with parameter 0 < ǫ < 1 2 , and block-MAP decoding. It was shown by Tillich and Zemor that in this case the error probability of the block-MAP decoder transitions “quickly” from δ to 1− δ for any δ > 0 if the minimum distance i...

پایان نامه :0 1391

uncertainty in the financial market will be driven by underlying brownian motions, while the assets are assumed to be general stochastic processes adapted to the filtration of the brownian motions. the goal of this study is to calculate the accumulated wealth in order to optimize the expected terminal value using a suitable utility function. this thesis introduced the lim-wong’s benchmark fun...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1393

abstract target-oriented approaches to translation studies are regarded as recent theories of translation. one of the most famous theories among these approaches is descriptive translation studies presented by toury (1995). this theory gives a new dimension to translation studies and gives importance to the descriptive rather than prescriptive studies. it also identifies three sets of transla...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم 1393

in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

chapter two presents three m-admissible function algebras ab, bd, and sl, to construct the universal abelian, band, and semilattice compactifications, respectively. the main results are (11.3), (12.3), and (12.4). some inclusion relationships between these function algebras and the other well-known ones, presented in section 8, are made via the devico of compactifications. chpter three is about...

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید