Sciweavers

62 search results - page 5 / 13
» Harmonic Functions and Collision Probabilities
Sort
View
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
13 years 10 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...
TON
2010
157views more  TON 2010»
13 years 1 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
INFOCOM
2005
IEEE
14 years 5 days ago
New insights from a fixed point analysis of single cell IEEE 802.11 WLANs
— We study a fixed point formalisation of the well known analysis of Bianchi [3]. We provide a significant simplification and generalisation of the analysis. In this more gene...
Anurag Kumar, Eitan Altman, Daniele Miorandi, Muni...
CANS
2005
Springer
120views Cryptology» more  CANS 2005»
14 years 3 days ago
The Second-Preimage Attack on MD4
In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function MD4. The techniques are not only efficient to search for collisions, but also applicabl...
Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
FSE
2009
Springer
125views Cryptology» more  FSE 2009»
14 years 7 months ago
On the Security of Tandem-DM
Abstract. We provide the first proof of security for Tandem-DM, one of the oldest and most wellknown constructions for turning a blockcipher with n-bit blocklength and 2n-bit keyle...
Ewan Fleischmann, Michael Gorski, Stefan Lucks