Sciweavers

17 search results - page 4 / 4
» The Hash Function and the Principle of Duality
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
14 years 2 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
ICCV
2007
IEEE
14 years 9 months ago
A Globally Optimal Algorithm for Robust TV-L1 Range Image Integration
Robust integration of range images is an important task for building high-quality 3D models. Since range images, and in particular range maps from stereo vision, may have a substa...
Christopher Zach, Thomas Pock, Horst Bischof