<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic hash functions / Information retrieval / Search algorithms / Hashing / Permutations / Error detection and correction / Hash function / Advantage / Birthday attack / Parity of a permutation / One-way compression function
Date: 2008-05-26 20:18:15
Cryptography
Cryptographic hash functions
Information retrieval
Search algorithms
Hashing
Permutations
Error detection and correction
Hash function
Advantage
Birthday attack
Parity of a permutation
One-way compression function

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

Add to Reading List

Source URL: web.cs.ucdavis.edu

Download Document from Source Website

File Size: 256,72 KB

Share Document on Facebook

Similar Documents

Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

DocID: 1qO3E - View Document

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

DocID: 1q3qz - View Document

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

DocID: 1pgef - View Document

Applications of Pairing Inversion The Pairing Zoo Miller Inversion Pairing Inversion  Aspects of Pairing Inversion

Applications of Pairing Inversion The Pairing Zoo Miller Inversion Pairing Inversion Aspects of Pairing Inversion

DocID: 1oeRJ - View Document

Which Kind of Module Should I Extract?? Ulrike Sattler1 , Thomas Schneider1 , and Michael Zakharyaschev2 1 University of Manchester, UK, {sattler,schneider}@cs.man.ac.uk 2

Which Kind of Module Should I Extract?? Ulrike Sattler1 , Thomas Schneider1 , and Michael Zakharyaschev2 1 University of Manchester, UK, {sattler,schneider}@cs.man.ac.uk 2

DocID: 1mtCQ - View Document