[PDF][PDF] Security and privacy in radio-frequency identification devices

SA Weis - 2003 - dspace.mit.edu
Abstract Radio Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical barcodes …

Cryptanalysis of block ciphers based on SHA-1 and MD5

MJO Saarinen - International workshop on fast software encryption, 2003 - Springer
We cryptanalyse some block cipher proposals that are based on dedicated hash functions
SHA-1 and MD5. We discuss a related-key attack against SHACAL-1 and present a method …

A truthful mechanism for fair load balancing in distributed systems

D Grosu, AT Chronopoulos - Second IEEE International …, 2003 - ieeexplore.ieee.org
In this paper we consider the problem of designing load balancing protocols in distributed
systems where the participants (eg computers, users) are capable of manipulating the load …

Secure block ciphers are not sufficient for one-way hash functions in the Preneel-Govaerts-Vandewalle model

S Hirose - Selected Areas in Cryptography: 9th Annual …, 2003 - Springer
There are many proposals of unkeyed hash functions based on block ciphers. Preneel,
Govaerts and Vandewalle, in their CRYPTO'93 paper, presented the general model of …

On parallel hash functions based on block-cipher

T Matsuo, K Kurosawa - Information Security and Privacy: 8th Australasian …, 2003 - Springer
In this paper, we study variants of the parallel hash function construction of Damgård. We
first show an improvement such that the number of processors is almost a half if| M|=(2 s+ 1) …

[引用][C] 基于Rijindael 的安全Hash 函数

纪家慧, 李大兴 - 计算机工程与应用, 2003