Sciweavers

7924 search results - page 108 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
EUROCRYPT
2005
Springer
14 years 2 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
ICML
2005
IEEE
14 years 9 months ago
Generalized skewing for functions with continuous and nominal attributes
This paper extends previous work on skewing, an approach to problematic functions in decision tree induction. The previous algorithms were applicable only to functions of binary v...
Soumya Ray, David Page
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
14 years 2 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
ISCAS
1999
IEEE
82views Hardware» more  ISCAS 1999»
14 years 1 months ago
Regular symmetric arrays for non-symmetric functions
A new class of non-totally symmetric functions which can be represented as simple regular symmetric arrays without redundancy is identified. Regular circuits are becoming crucialy...
Malgorzata Chrzanowska-Jeske
ENTCS
2007
102views more  ENTCS 2007»
13 years 9 months ago
Encoding Functional Relations in Scunak
We describe how a set-theoretic foundation for mathematics can be encoded in the new system Scunak. We then discuss an encoding of the construction of functions as functional relat...
Chad E. Brown