Group signature schemes and payment systems based on the discrete logarithm problem

J Camenisch - 1998 - research-collection.ethz.ch
The security of many cryptographic systems relies on the difficulty of computing discrete
logarithms in certain finite groups. This dissertation studies existing cryptographic protocols …

[PDF][PDF] Cryptographic hash functions: A survey

S Bakhtiari, R Safavi-Naini, J Pieprzyk - 1995 - Citeseer
This paper gives a survey on cryptographic hash functions. It gives an overview of all types
of hash functions and reviews design principals and possible methods of attacks. It also …

Heuristic design of cryptographically strong balanced Boolean functions

W Millan, A Clark, E Dawson - … '98: International Conference on the Theory …, 1998 - Springer
Advances in the design of Boolean functions using heuristic techniques are reported. A
genetic algorithm capable of generating highly nonlinear balanced Boolean functions is …

A failure-friendly design principle for hash functions

S Lucks - Advances in Cryptology-ASIACRYPT 2005: 11th …, 2005 - Springer
This paper reconsiders the established Merkle-Damgård design principle for iterated hash
functions. The internal state size w of an iterated n-bit hash function is treated as a security …

[图书][B] Secret history: The story of cryptology

C Bauer - 2021 - taylorfrancis.com
The first edition of this award-winning book attracted a wide audience. This second edition is
both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no …

Correlation matrices

J Daemen, V Rijmen, J Daemen, V Rijmen - The design of Rijndael: the …, 2020 - Springer
7. Correlation Matrices Page 1 7. Correlation Matrices In this chapter we consider correlations
over Boolean functions and iterated Boolean transformations. Correlations play an important …

Криптографические протоколы: основные свойства и уязвимости

АВ Черемушкин - Прикладная дискретная математика …, 2009 - cyberleninka.ru
В лекции рассматриваются основные понятия, связанные с криптографическими
протоколами, определяются их основные свойства и уязвимости. Приводятся примеры …

Two practical and provably secure block ciphers: BEAR and LION

R Anderson, E Biham - … Workshop Cambridge, UK, February 21–23 1996 …, 1996 - Springer
In this paper we suggest two new provably secure block ciphers, called BEAR and LION.
They both have large block sizes, and are based on the Luby-Rackoff construction. Their …

[图书][B] 网络安全: 技术与实践

刘建伟, 王育民 - 2005 - books.google.com
本书共3 篇15 章. 第1 篇为网络安全基础, 共3 章, 主要讨论了网络安全的基础知识,
并从网络协议安全性的角度出发, 阐述了当今计算机网络中存在的安全威胁; 第2 …

QC-Trees: An efficient summary structure for semantic OLAP

LVS Lakshmanan, J Pei, Y Zhao - Proceedings of the 2003 ACM …, 2003 - dl.acm.org
Recently, a technique called quotient cube was proposed as a summary structure for a data
cube that preserves its semantics, with applications for online exploration and visualization …