نتایج جستجو برای: preimage resistance

تعداد نتایج: 375710  

Journal: :Studia Mathematica 2021

We prove that every dynamical system $X$ with a free action of countable amenable group $G$ by homeomorphisms has zero-dimensional extension $Y$ which is faithful and principal, i.e. $G$-invariant measure $\mu $ on exactly one preimage

Journal: :International Journal of Electronics and Telecommunications 2023

In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden.  The hash can be used for different purposes, such as pseudo-random bit sequences generator, key wrapping or one pass authentication, especially weak devices (WSN, IoT, etc.). Analysis of function showed that successful preimage attacks possible low round hashes, protection fro...

2011
Walter Bergweiler Alexandre Eremenko

We prove that the derivative of a non-linear entire function is unbounded on the preimage of an unbounded set. MSC 2010: 30D30.

2013
Bart Mennink

Double block length hashing covers the idea of constructing a compression function on 2n bits using an n-bit block cipher. In this work, we present a comprehensive indifferentiability analysis of all relevant double length compression functions. Indifferentiability is a stronger security notion than collision and preimage resistance and ensures that a design has no structural flaws. It is very ...

2009
Orr Dunkelman Ewan Fleischmann Michael Gorski Stefan Lucks

In this paper we investigate the security of the compression function of HAS-160 in encryption mode. The structure of HAS-160 is similar to SHA-1 besides some modifications.This is the first cryptographic attack that breaks the encryption mode of the full 80-round HAS-160. We apply a key recovery attack that requires 2 chosen plaintexts and 2 80-round HAS-160 encryptions. The attack does not ai...

2002
PETER SAVELIEV

X : f (x) = g(x)} is a compact subset of X\∂X. In case of codimension 0, the Nielsen number is the lower estimate of the number of points in this set. We suggest a generalization of the classical Nielsen theory for the coincidence and as well as the preimage problems in order to provide a framework for some recent Wecken type results for codimension 1. The Nielsen equivalence on the set of coin...

2007
Lars R. Knudsen Christian Rechberger Søren S. Thomsen

In this paper we propose the Grindahl family of hash functions, which is based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the important feature that no low-weight characteristics form collisions, and at the same time it limits access to the state. We also propose two instances of the Grindahl hash family, Grindahl-256 and Grindahl-5...

Journal: :Complex Systems 2003
Henryk Fuks

Regularities are searched for in the sequences of numbers of preimages for elementary cellular automata (CA). For 46 out of 88 “minimal” rules, recognizable patterns are found, usually in the form of second order recurrence equations with constant coefficients. After introducing the concept of asymptotic emulation of CA rules, it is shown how the regularities in the sequences of preimage number...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید