Sciweavers

206 search results - page 10 / 42
» Analysis of Multivariate Hash Functions
Sort
View
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
14 years 1 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
IWPEC
2010
Springer
13 years 7 months ago
Multivariate Complexity Analysis of Swap Bribery
We consider the computational complexity of a problem modeling bribery in the context of voting systems. In the scenario of Swap Bribery, each voter assigns a certain price for swa...
Britta Dorn, Ildikó Schlotter
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
14 years 4 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
MOBIQUITOUS
2005
IEEE
14 years 3 months ago
Multivariate Analysis for Probabilistic WLAN Location Determination Systems
WLAN location determination systems are gaining increasing attention due to the value they add to wireless networks. In this paper, we present a multivariate analysis technique fo...
Moustafa Youssef, Mohamed Abdallah
ASIACRYPT
2009
Springer
14 years 4 months ago
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functi...
Eric Brier, Shahram Khazaei, Willi Meier, Thomas P...