This paper gives a survey on cryptographic hash functions. It gives an overview of all types of hash functions and reviews design principals and possible methods of attacks. It also …
W Millan, A Clark, E Dawson - … '98: International Conference on the Theory …, 1998 - Springer
Advances in the design of Boolean functions using heuristic techniques are reported. A genetic algorithm capable of generating highly nonlinear balanced Boolean functions is …
S Lucks - Advances in Cryptology-ASIACRYPT 2005: 11th …, 2005 - Springer
This paper reconsiders the established Merkle-Damgård design principle for iterated hash functions. The internal state size w of an iterated n-bit hash function is treated as a security …
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no …
J Daemen, V Rijmen, J Daemen, V Rijmen - The design of Rijndael: the …, 2020 - Springer
7. Correlation Matrices Page 1 7. Correlation Matrices In this chapter we consider correlations over Boolean functions and iterated Boolean transformations. Correlations play an important …
АВ Черемушкин - Прикладная дискретная математика …, 2009 - cyberleninka.ru
В лекции рассматриваются основные понятия, связанные с криптографическими протоколами, определяются их основные свойства и уязвимости. Приводятся примеры …
R Anderson, E Biham - … Workshop Cambridge, UK, February 21–23 1996 …, 1996 - Springer
In this paper we suggest two new provably secure block ciphers, called BEAR and LION. They both have large block sizes, and are based on the Luby-Rackoff construction. Their …
LVS Lakshmanan, J Pei, Y Zhao - Proceedings of the 2003 ACM …, 2003 - dl.acm.org
Recently, a technique called quotient cube was proposed as a summary structure for a data cube that preserves its semantics, with applications for online exploration and visualization …