• No results found

one-way hash functions

Constructing  CCA-secure  predicate  encapsulation  schemes  from  CPA-secure  schemes   and  universal  one-way  hash  functions

Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions

... universal one-way hash function and an algorithm that checks some consistency properties of the original ...universal one-way hash functions we need not extend the users ...

18

Generalized compact knapsacks, cyclic lattices, and efficient one-way functions

Generalized compact knapsacks, cyclic lattices, and efficient one-way functions

... than one-way functions and collision resistant hash ...functions. One-way functions are known to be sufficient to build many other useful cryptographic primitives, ...

29

Annual Growth Rate Analysis of Select Private Sector Sugar Mills in Tamilnadu

Annual Growth Rate Analysis of Select Private Sector Sugar Mills in Tamilnadu

... SHA-1(Secure Hash Algorithm) is iterative, one-way hash functions that can process a message to produce a condensed representation called a message ...

5

An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices

An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices

... On the other hand, the DRM scheme can be also applied to digital right protection for enterprise applications. In 2008, Chen [14] proposed a traceable enterprise digital right management (E-DRM) scheme based on ...

8

Cryptographic  Hashing  From  Strong  One-Way  Functions

Cryptographic Hashing From Strong One-Way Functions

... • An optimal parallel repetition theorem for the hardness of F, i.e. one which states that if a function f ← F is (s, δ)-hard to invert, then its k-wise repetition f k is (s, δ k )-hard to invert. However, such a ...

51

On  the  Existence  of  Extractable  One-Way  Functions

On the Existence of Extractable One-Way Functions

... 3-round ZK with black-box simulation. Goldreich and Krawczyk [GK96] show that a 3-message protocol for a language L ∈ / BPP that is zero-knowledge against non-uniform verifiers cannot have a black-box simulator. That is, ...

42

A Class of Non Invertible Matrices in GF(2) for Practical One Way Hash Algorithm

A Class of Non Invertible Matrices in GF(2) for Practical One Way Hash Algorithm

... from hash function is called hash code [10]. One-way hash function is a function that as a input has variable string length and outputs a fixed binary sequence that cannot be reversed ...

6

The  Randomized  Iterate  Revisited -  Almost  Linear  Seed  Length  PRGs  from  A  Broader  Class  of  One-way  Functions

The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions

... the hash functions from bounded space generators ...regular one-way function f has 2 k images then the amount of secret randomness needed is k (instead of n ...any one-way ...

24

Non-Interactive  Secure  Computation  from  One-Way  Functions

Non-Interactive Secure Computation from One-Way Functions

... general functions where each party exchanges one token with the other party, based on enhanced trapdoor permu- ...collision-resistant hash functions ...only one, while still using only ...

22

A  Note  on  Quantum  Security  for  Post-Quantum  Cryptography

A Note on Quantum Security for Post-Quantum Cryptography

... some hash-based signature ...of hash-tree based signature schemes from one-way functions carries over to the quantum setting, assuming the underlying one-way function is ...

18

Algebraic (Trapdoor)  One  Way  Functions   and  their  Applications

Algebraic (Trapdoor) One Way Functions and their Applications

... the hash function H, the signature scheme described in the previous section can be proven secure without random oracles, but in a weaker security model in which the adversary is allowed to ask signatures on only Q ...

39

Mix-Compress-Mix  Revisited:  Dispensing  with  Non-invertible  Random  Injection  Oracles

Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles

... (DMS) hash functions that are simultaneously provably collision resistant (CR) in the standard model and provably pseudorandom oracle (PRO) in an ideal- ized ...DMS hash function was first ...

21

Security and Authentication Architecture of block cipher using Mathematical operation and one-way hash function

Security and Authentication Architecture of block cipher using Mathematical operation and one-way hash function

... using hash functions is based on the rigidity of finding the collision ...encrypted hash code. Besides these applications cryptographic hash functions are used to learn intrusion ...

6

Pseudo-Free  Families  of  Finite  Computational  Elementary  Abelian $p$-Groups

Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups

... least one of two additional conditions ...or one-wayness of certain homomorphic families of knapsack ...With one exception, these conditions are the existence of certain homomorphic ...

19

One-Way  Functions   and (Im)perfect  Obfuscation

One-Way Functions and (Im)perfect Obfuscation

... Intuitively, the proof of the lower bound goes as follows. We begin with the assumption that A is a very good inverter for random images of f that are of the form Z b ◦ Z ◦ h ◦ k ◦ h(x)| k (since f is not weakly ...

26

ANALYSIS OF SHA-1 IMPLEMENTATION USING BASELINE ARCHITECTURE AND MULTI-INPUT ADDING

ANALYSIS OF SHA-1 IMPLEMENTATION USING BASELINE ARCHITECTURE AND MULTI-INPUT ADDING

... of hash functions, symmetric key algorithms, and public key ...while hash functions are one way functions as they don’t allow the retrieval of processed ...secure ...

8

Monotone Circuits: One-Way Functions versus Pseudorandom Generators

Monotone Circuits: One-Way Functions versus Pseudorandom Generators

... A fundamental result in this area asserts that one-way functions exist if any only if pseudorandom generators exist [7] (see also [5, Sec. 3.5]). A relatively recent result of Applebaum, Ishai, and ...

8

Cryptanalysis  of  an  Improved  One-Way  Hash  Chain  Self-Healing  Group  Key  Distribution  Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

... Recently, Chen et al.et al. [13] developed a scheme to realize the self-healing group key distribution based on one-way hash chain which can resist the collusion attack. In the new scheme, users are ...

9

Reset  Indifferentiability  from  Weakened  Random  Oracle  Salvages  One-pass  Hash  Functions

Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions

... As noted in [2], in the RO model, mmr-sources have access to the RO. In this setting, the min- entropy requirement is independent of the coins used by the RO, meaning the bound must hold for any fixed choice of function ...

28

Simple  composition  theorems  of  one-way  functions --  proofs   and  presentations

Simple composition theorems of one-way functions -- proofs and presentations

... One-way functions are both central to cryptographic theory and a clear example of its complexity as a ...on one-way functions, namely: composition theorems of ...

18

Show all 10000 documents...

Related subjects