搜索结果: 1-6 共查到“军队指挥学 Sufficient Conditions”相关记录6条 . 查询时间(0.055 秒)
Sufficient conditions for sound hashing using a truncated permutation
foundations / permutation-based hashing indifferentiability tree hashing
2012/3/26
In this paper we give a generic security proof for hashing modes that make use of an underlying fixed-length permutation. We formulate a set of five simple conditions, which are easy to implement and ...
Tree hashing has several advantages over sequential hashing such as parallelism and a
lower cost of hash value recomputation when only a small part of the input changes. In this paper
we consider th...
Wang’s sufficient conditions of MD5 are not sufficient
Wang’s sufficient conditions MD5 collision search algorithm
2009/2/23
In this paper, we report that the “sufficient
conditions” of MD5 [1] of the modification
technique for the collision search algorithm described
by Wang [2] are not sufficient. In our
analysis, we ...
Wang and Yu showed that MD5 was not collision-resistant, but it is known that their sufficient
conditions for finding a collision of MD5 includes some mistakes. In this paper, we examine the
suffici...
KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption
KEM DEM Secure Hybrid Encryption
2008/12/10
The KEM/DEM hybrid encryption paradigm combines the efficiency and large message
space of secret key encryption with the advantages of public key cryptography. Due to
its simplicity and °exibility, ...
Sufficient Conditions for Computational Intractability Regarding Generic Algorithms
Generic Group Model Straight-Line Programs Hardness Conditions
2008/5/28
The generic group model is a valuable methodology for analyzing the computational hardness of the number-theoretic problems used in cryptography. Although generic hardness proofs exhibit many similari...