S Lucks - Cryptology ePrint Archive, 2004 - eprint.iacr.org
This paper deals with the security of iterated hash functions against generic attacks, such as, eg, Joux'multicollision attacks from Crypto 04. The core idea is to increase the size of the …
I Damgård, S Fehr, L Salvail - … in Cryptology–CRYPTO 2004: 24th Annual …, 2004 - Springer
The concept of zero-knowledge (ZK) has become of fundamental importance in cryptography. However, in a setting where entities are modeled by quantum computers …
F Muller - International Conference on the Theory and …, 2004 - Springer
MD2 is an early hash function developed by Ron Rivest for RSA Security, that produces message digests of 128 bits. In this paper, we show that MD2 does not reach the ideal …
A sensitivity index quantifies the degree of smoothness with which it responds to fluctuations in the wishes of the members of a voting body. This paper characterizes the Banzhaf …
In this paper a new approach to fragile watermarking technique is introduced. This problem is particularly interesting in the field of modern multimedia applications, when image and …
P Gauravaram, W Millan, L May - Cryptographic Algorithms and their Uses, 2004 - Citeseer
Most of the currently accepted designs for cryptographic hash functions are in the style of a block cipher in feed-forward mode. With increasing interest in all forms of cryptanalysis, this …
For arbitrary Boolean functions, an easy counting argument shows that there must exist non normal functions of n variables for n> 10. It was even shown in [21] that, for increasing …
Modern business creates an increasing need for sharing, querying and mining information across autonomous enterprises while maintaining privacy of their own data records. The …
B Preneel - … Conference on Security in Communication Networks, 2004 - Springer
In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political controls of …