Search results

From MaRDI portal
  • Preimage Attack on the Parallel FFT-Hashing Function 2009-03-06 Paper Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 2009-03-06...
    10 bytes (13 words) - 22:41, 10 December 2023
  • Preimage Attack on the Parallel FFT-Hashing Function 2009-03-06 Paper Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 2009-03-06...
    10 bytes (13 words) - 22:41, 10 December 2023
  • Paper A New Dedicated 256-Bit Hash Function: FORK-256 2009-04-02 Paper Preimage Attack on the Parallel FFT-Hashing Function 2009-03-06 Paper Provable Security...
    10 bytes (14 words) - 19:22, 9 December 2023
  • Paper A New Dedicated 256-Bit Hash Function: FORK-256 2009-04-02 Paper Preimage Attack on the Parallel FFT-Hashing Function 2009-03-06 Paper Improved Indifferentiability...
    10 bytes (13 words) - 18:50, 24 September 2023
  • from Fixed-Length PRPs 2009-04-29 Paper Preimage Attack on the Parallel FFT-Hashing Function 2009-03-06 Paper Cryptographic Hardness Based on the Decoding...
    10 bytes (15 words) - 10:21, 8 December 2023
  • general-linear-complex special configuration of parallel manipulators. 1999-09-15 Paper Design and analysis of a hybrid serial-parallel manipulator. 1999-09-15 Paper A...
    10 bytes (12 words) - 13:11, 24 September 2023
  • replicator equation in game theory 1999-11-29 Paper FFT algorithms and their adaptation to parallel processing 1999-11-28 Paper Separation for ordinary...
    10 bytes (13 words) - 10:02, 24 September 2023
  • without quantum computers: the case of multiquadratics 2017-06-13 Paper Hash-Function Based PRFs: AMAC and Its Multi-User Security 2016-09-09 Paper Dual EC:...
    10 bytes (17 words) - 08:07, 7 October 2023
  • distribution of squarefree numbers 2015-10-21 Paper Quantum hashing via \(\epsilon\)-universal hashing constructions and classical fingerprinting 2015-10-20...
    10 bytes (12 words) - 10:09, 6 October 2023
  • Nonmalleable Commitments 2008-12-22 Paper SWIFFT: A Modest Proposal for FFT Hashing 2008-09-18 Paper On Robust Combiners for Oblivious Transfer and Other...
    10 bytes (14 words) - 09:34, 7 October 2023
  • de/entity/Q3549647 2009-01-05 Paper SWIFFT: A Modest Proposal for FFT Hashing 2008-09-18 Paper Limits on the hardness of lattice problems in \(\ell_{p}\) norms...
    10 bytes (15 words) - 07:39, 7 October 2023
  • Recommendations SWIFFT: A Modest Proposal for FFT Hashing Publication:4318727 Preimage Attack on the Parallel FFT-Hashing Function Publication:4279659 Mathematics Subject...
    15 bytes (139 words) - 08:43, 7 February 2024
  • {F}_{q}+v^{2}\mathbb {F}_{q}\) 2018-07-19 Paper A Low-Complexity PTS-Based Radix FFT Method for PAPR Reduction in OFDM Systems 2018-06-27 Paper Double Point Compression...
    10 bytes (17 words) - 17:48, 8 December 2023
  • Preimages for the Tillich-Zémor hash function zbMATH Keywords cryptographic hash functionpreimage attackparallel FFT-hashing function Mathematics Subject Classification...
    15 bytes (127 words) - 05:19, 5 February 2024
  • SWIFFT: A Modest Proposal for FFT Hashing Title not available (Why is that?) Preimage Attack on the Parallel FFT-Hashing Function This page was built for publication:...
    15 bytes (101 words) - 21:34, 6 February 2024
  • Preimage Attacks on Step-Reduced MD5 Preimage Attack on the Parallel FFT-Hashing Function This page was built for publication: Finding Preimages in Full...
    15 bytes (657 words) - 06:17, 5 February 2024
  • Proposal for FFT Hashing Title not available (Why is that?) Title not available (Why is that?) Preimage Attack on the Parallel FFT-Hashing Function This page...
    15 bytes (114 words) - 19:11, 6 February 2024
  • and applications to hashing Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\) Preimage Attack on the Parallel FFT-Hashing Function This page was built...
    15 bytes (430 words) - 22:48, 3 February 2024
  • The parallel reversible pebbling game: analyzing the post-quantum security of iMHFs Balloon hashing: a memory-hard function providing provable protection...
    15 bytes (474 words) - 21:38, 8 February 2024
  • \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\) Algorithm construction of HLI hash function Lattice-Based Identification...
    15 bytes (567 words) - 01:03, 5 February 2024