Sciweavers

143 search results - page 20 / 29
» Hash, Displace, and Compress
Sort
View
TMI
2008
141views more  TMI 2008»
13 years 7 months ago
Ultrasound Elastography: A Dynamic Programming Approach
This paper introduces a 2-D strain imaging technique based on minimizing a cost function using dynamic programming (DP). The cost function incorporates similarity of echo amplitude...
Hassan Rivaz, Emad Boctor, Pezhman Foroughi, Richa...
FOCS
2006
IEEE
14 years 1 months ago
On the Compressibility of NP Instances and Cryptographic Applications
We study compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problem...
Danny Harnik, Moni Naor
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
14 years 27 days ago
Preimage and Collision Attacks on MD2
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The ...
Lars R. Knudsen, John Erik Mathiassen
IEICET
2008
147views more  IEICET 2008»
13 years 7 months ago
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
In this paper, we introduce new compression function design principles supporting variable output lengths (multiples of size n). They are based on a function or block cipher with a...
Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul ...
CHES
2007
Springer
94views Cryptology» more  CHES 2007»
14 years 1 months ago
MAME: A Compression Function with Reduced Hardware Requirements
This paper describes a new compression function, MAME designed for hardware-oriented hash functions which can be used in applications reduced hardware requirements. MAME takes a 25...
Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, J...