Sciweavers

658 search results - page 61 / 132
» The Grindahl Hash Functions
Sort
View
ASAP
2009
IEEE
159views Hardware» more  ASAP 2009»
15 years 11 months ago
A High-Performance Hardware Architecture for Spectral Hash Algorithm
—The Spectral Hash algorithm is one of the Round 1 candidates for the SHA-3 family, and is based on spectral arithmetic over a finite field, involving multidimensional discrete...
Ray C. C. Cheung, Çetin K. Koç, John...
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 10 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
ICES
2000
Springer
91views Hardware» more  ICES 2000»
15 years 8 months ago
Dynamic Optimisation of Non-linear Feed Forward Circuits
Abstract. An evolutionary algorithm is used to evolve a digital circuit which computes a simple hash function mapping a 16-bit address space into an 8-bit one. The target technolog...
Ernesto Damiani, Valentino Liberali, Andrea Tettam...
EUROCRYPT
2008
Springer
15 years 6 months ago
Security/Efficiency Tradeoffs for Permutation-Based Hashing
We provide attacks and analysis that capture a tradeoff, in the ideal-permutation model, between the speed of a permutation-based hash function and its potential security. For coll...
Phillip Rogaway, John P. Steinberger
NDSS
2006
IEEE
15 years 10 months ago
Deploying a New Hash Algorithm
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away fro...
Steven M. Bellovin, Eric Rescorla