搜索结果: 1-5 共查到“军队指挥学 Hamsi”相关记录5条 . 查询时间(0.796 秒)
An Improved Algebraic Attack on Hamsi-256
Algebraic attacks second preimages hash functions Hamsi
2010/11/26
Hamsi is one of the $14$ second-stage candidates in NIST's SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version published by Thomas Fuhr ...
Differential Distinguishers for the Compression Function and Output Transformation of Hamsi-256
hash functions differential cryptanalysis SHA-3
2010/3/16
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future
hash standard SHA-3. Until now, little analysis has been published on its resistance to dierential cryptanalysis, th...
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
Hash functions SHA-3 competition cryptanalysis
2010/2/20
Hamsi is one of the second round candidates of the SHA-3
competition. In this study, we present non-random differential properties
for the compression function of the hash function Hamsi-256. Based
...
High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash,ECHO, Fugue, Grstl, Hamsi, JH, Keccak,Lua, Shabal, SHAvite-3, SIMD, and Skein Version 2.0, November 11, 2009
SHA-3 round 2 hardware
2009/11/18
In this paper we describe our high-speed hardware implementations
of the 14 candidates of the second evaluation round of the
SHA-3 hash function competition. We synthesized all implementations
usin...
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256
hash functions SHA-3 near collision
2009/10/9
Hamsi-256 is designed by ¨Ozg¨ul K¨uc¨uk and it has been a candidate Hash
function for the second round of SHA-3. The compression function of Hamsi-256 maps
a 256-bit chaining value and a 32-bit mes...