Round function

Results: 62



#Item
11

A Document describing all modifications made on the Blue Midnight Wish cryptographic hash function before entering the Second Round of SHA-3 hash competition Danilo Gligoroski1 and Vlastimil Klima2 1

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2009-09-10 06:56:48
    12Algebra / Convex geometry / Convex polytope / Polytopes / Convex function / Polyhedron / Inequality / Operations research / Cubic function / Mathematics / Elementary algebra / Geometry

    Round 2 Grading Criteria IMPORTANT NOTE: On all problems, the graders have the discretion to deduct 1 additional point for a solution that is poorly written and/or hard to follow. IMPORTANT NOTE: Appropriate credit shoul

    Add to Reading List

    Source URL: www.usamts.org

    Language: English - Date: 2015-01-29 12:20:45
    13Topology / Diagrams / Discrete geometry / Voronoi diagram / Continuous function / Support / Germ / Mathematical analysis / Mathematics / Computational geometry

    CCCG 2013, Waterloo, Ontario, August 8–10, 2013 One-Round Discrete Voronoi Game in R2 in Presence of Existing Facilities Aritra Banik∗ Bhaswar B. Bhattacharya†

    Add to Reading List

    Source URL: www.cccg.ca

    Language: English - Date: 2013-08-11 21:51:56
    14Personal life / Humanitarian aid / Health sciences / Self-care / Food security / Food and Agriculture Organization / Malnutrition / Hunger / Nutrition / Health / Food and drink / Food politics

    CFS41 – UNSCN Interventions in Plenary Monday 13th October - Round Tables: Food losses and waste in the context of sustainable food systems (IV) Food losses and waste are a consequence of how our food systems function.

    Add to Reading List

    Source URL: www.unscn.org

    Language: English - Date: 2014-11-05 04:53:17
    15Theoretical computer science / Mathematical optimization / Genetic algorithms / Cybernetics / Evolutionary algorithms / Travelling salesman problem / Greedy algorithm / Fitness function / Genetic programming / Mathematics / Applied mathematics / Operations research

    Evolution of a Path Generator for a Round-Trip Symmetric Traveling Salesperson Problem Using Genetic Programming Bretton Swope Stanford Mechanical Engineering Department Stanford University

    Add to Reading List

    Source URL: www.genetic-programming.org

    Language: English - Date: 2006-11-17 21:29:24
    16Threefish / Rotational cryptanalysis / Cryptographic hash function / Block cipher / Hash function / Cryptanalysis / Cryptography / NIST hash function competition / Skein

    The Skein Hash Function Family NIST Round 3 Tweak Description 25 Oct 2010 Description of Changes The only change to the Skein hash function is in the key schedule parity constant, found in Sectionof the newly subm

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:32
    17KASUMI / Block cipher / VEST / Feistel cipher / Linear cryptanalysis / SC2000 / Data Encryption Standard / Cryptography / Differential cryptanalysis / MISTY1

    Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-01-17 09:45:21
    18Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

    Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2012-12-10 07:37:20
    19Linear cryptanalysis / Block cipher / ICE / Blowfish / Lucifer / Differential cryptanalysis / Advanced Encryption Standard / Ciphertext / Feistel cipher / Cryptography / Data Encryption Standard / GOST

    Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-16 10:47:29
    20Function / Preimage attack / Image / Inverse function / Valuation / GOST / Mathematics / Cryptography / Cryptographic hash functions

    Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-08-22 12:08:36
    UPDATE