SWIFFT

Results: 17



#Item
11Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
12One-way compression function / Merkle–Damgård construction / Random oracle / Universal one-way hash function / Collision resistance / Hash function / Collision / Birthday attack / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound Charles Bouillaguet∗, Pierre-Alain Fouque

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-02-10 05:35:28
13Mathematical analysis / SWIFFT / Fast Fourier transform / Universal hashing / Fourier transform / SHA-2 / Vector space / Random oracle / Hash function / Cryptographic hash functions / Mathematics / Algebra

SWIFFT: A Modest Proposal for FFT Hashing Vadim Lyubashevsky1 , Daniele Micciancio1 , Chris Peikert2, , and Alon Rosen3 1

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2009-08-17 12:04:34
14Cryptography / Lattice points / Lattice-based cryptography / Lattice problem / Lattice / SWIFFT / Ideal lattice cryptography / Quantum computer / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Mathematics / Algebra / Abstract algebra

PDF Document

Add to Reading List

Source URL: www.math.uni-bonn.de

Language: English - Date: 2010-06-11 10:49:47
15Search algorithms / SWIFFT / Merkle–Damgård construction / Applied mathematics / Hash function / One-way function / Computing / Cyberwarfare / GOST / Cryptographic hash functions / Cryptography / Hashing

PDF Document

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2008-10-30 09:32:13
16Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 15:32:23
17Mathematical analysis / SWIFFT / Fast Fourier transform / Universal hashing / Fourier transform / SHA-2 / Vector space / Random oracle / Hash function / Cryptographic hash functions / Mathematics / Algebra

PDF Document

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2008-02-21 04:10:07
UPDATE