<--- Back to Details
First PageDocument Content
Geometry / Error detection and correction / Elliptic curve / Topology / Preimage attack / Hash function / Curve / Cryptographic hash functions / Mathematics / Elliptic curve only hash
Date: 2009-04-10 16:39:37
Geometry
Error detection and correction
Elliptic curve
Topology
Preimage attack
Hash function
Curve
Cryptographic hash functions
Mathematics
Elliptic curve only hash

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 44,57 KB

Share Document on Facebook

Similar Documents

Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

DocID: 1lo8W - View Document

Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

DocID: 1l2py - View Document

Polynomials / Algebraic geometry / Commutative algebra / Computer algebra / System of polynomial equations / Finite field / NP / Time complexity / Elliptic curve only hash / Abstract algebra / Mathematics / Algebra

PDF Document

DocID: 14sXr - View Document

Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

DocID: 12HMr - View Document

Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

DocID: 12CJD - View Document