[PDF][PDF] Cipher and hash function design strategies based on linear and differential cryptanalysis

J Daemen - 1995 - cs.ru.nl
This thesis contains a new approach to design block ciphers, synchronous and self-
synchronizing stream ciphers and cryptographic hash functions. The goal of this approach is …

[引用][C] Applied cryptography: protocols, algorithms, and source code in C

B Schneier - 2007 - john wiley & sons

[PDF][PDF] Secure names for bit-strings

S Haber, WS Stornetta - Proceedings of the 4th ACM Conference on …, 1997 - dl.acm.org
Having the author or publisher of a document compute a digital signature for its bit-string
content is a reasonable use of cryptographic tools for this purpose.(See, for example,[R 95 …

Multicollisions in iterated hash functions. Application to cascaded constructions

A Joux - Annual International Cryptology Conference, 2004 - Springer
In this paper, we study the existence of multicollisions in iterated hash functions. We show
that finding multicollisions, ie r-tuples of messages that all hash to the same value, is not …

Fast hashing and rotation-symmetric functions

J Pieprzyk, C Qu - 2024 - openrepository.mephi.ru
Efficient hashing is a centerpiece of modern Cryptography. The progress in computing
technology enables us to use 64-bit machines with the promise of 128-bit machines in the …

Cryptographic hash functions

B Preneel - European Transactions on Telecommunications, 1994 - Wiley Online Library
Hash functions were introduced in cryptology in the late seventies as a tool to protect the
authenticity of information. Soon it became clear that they were a very useful building block …

[PDF][PDF] Security and privacy in radio-frequency identification devices

SA Weis - 2003 - dspace.mit.edu
Abstract Radio Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical barcodes …

A review of medical image watermarking requirements for teleradiology

H Nyeem, W Boles, C Boyd - Journal of digital imaging, 2013 - Springer
Teleradiology allows medical images to be transmitted over electronic networks for clinical
interpretation and for improved healthcare access, delivery, and standards. Although such …

[PDF][PDF] The Whirlpool hashing function

P Barreto, V Rijmen - First open NESSIE Workshop, Leuven, Belgium, 2000 - Citeseer
The WHIRLPOOL Hashing Function Page 1 The WHIRLPOOL Hashing Function Paulo SLM
Barreto1⋆ and Vincent Rijmen2⋆⋆ 1 Scopus Tecnologia SA Av. Mutinga, 4105 - Pirituba …

Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning

C Noyes - arXiv preprint arXiv:1601.01405, 2016 - arxiv.org
I present the design and implementation of a novel anti-malware environment called BitAV.
BitAV allows for the decentralization of the update and maintenance mechanisms of the …