搜索结果: 1-8 共查到“军队指挥学 CubeHash”相关记录8条 . 查询时间(0.103 秒)
A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions
SHA-3 candidate CubeHash rotational analysis distinguisher
2012/3/23
CubeHash is one of the round 2 candidates of the public SHA-3 competition hosted by NIST. It was designed by Bernstein. In this paper we find a new distinguisher to distinguish CubeHash compression fu...
Linear Analysis of Reduced-Round CubeHash
CubeHash SHA-3 competition Linear cryptanalysis
2010/10/20
Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join the SHA family of standards. One...
In this short note we show a quantum preimage attack on CubeHash-normal-512 with complexity 2^192. This kind of attack is expected to cost 2^256 for a good 512-bit hash function, and we argue that thi...
Symmetric States and their Structure: Improved Analysis of CubeHash
CubeHash SHA-3 hash function collision preimage
2010/7/13
This paper provides three improvements over previous work on analyzing CubeHash, based on its classes of symmetric states: (1) We present a detailed analysis of the hierarchy of symmetry classes. (2) ...
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash,ECHO, Fugue, Grstl, Hamsi, JH, Keccak,Lua, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009
SHA-3 round 2 hardware
2009/11/18
In this paper we describe our high-speed hardware implementations
of the 14 candidates of the second evaluation round of the
SHA-3 hash function competition. We synthesized all implementations
usin...
Single Block Attacks and Statistical Tests on CubeHash
Single Block Attacks Statistical Tests CubeHash
2009/8/25
This paper describes a second preimage attack on the CubeHash cryptographic
one-way hash function. The attack finds a second preimage in
less time than brute force search for these CubeHash variants...
Linearization Framework for Collision Attacks:Application to CubeHash and MD6
Hash functions collisions differential attack
2009/8/18
In this paper, an improved differential cryptanalysis framework for finding collisions in hash
functions is provided. Its principle is based on linearization of compression functions in order to find...
FPGA Implementations of SHA-3 Candidates:CubeHash, Grøstl, LANE, Shabal and Spectral Hash
FPGA SHA-3 Candidates CubeHash LANE
2009/7/14
Hash functions are widely used in, and form an
important part of many cryptographic protocols. Currently, a
public competition is underway to find a new hash algorithm(s)
for inclusion in the NIST ...