A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes a novel one-way hash function that can serve as a tool in achieving authenticity and data integrity. The one-way hash function can be viewed as a representative of a family of fast dedicated one-way hash functions whose construction is based on linear cellular automata over GF(q). The design and analysis of security of the function is accomplished by the use of very recently published results on cellular automata and their applications in cryptography. The analysis indicates that the one-way hash function is secure against all known attacks. A promising property of the proposed one-way hash function is that it is especially suitable for compact and fast implementation.
- 社団法人電子情報通信学会の論文
- 1999-01-25
著者
-
IMAI Hideki
University of Tokyo
-
Zheng Yuliang
Monash University
-
Mihaljevic Miodrag
Academy Of Science And Arts Kneza Mihaila
関連論文
- Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- How to Protect Peer-to-Peer Online Games from Cheats
- An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations : Special Section on Cryptography and Information Security
- A Novel Fast Correlation Attack Suitable for Simple Hardare Implementation
- Multilevel Coded 16-QAM Modulation with Multistage Decoding and Unequal Error Protection
- A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q) (Special Section on Cryptography and Information Security)
- A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF(q) and Time-Variant Table (Special Section on Cryptography and Information Security)
- Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems(Wireless Communication Technology)
- Sliced Onion Routing Scheme and its Aptitude for Sender-Identifiable Environments
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- Discussions on Unconditionally Secure VSS Robust against Dishonest Majority
- A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures : Special Section on Cryptography and Information Security
- Efficient Unconditionally Secure Digital Signatures (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
- Deforestation and Degradation of Natural Resources in Ethiopia : Forest Management Implications from a Case Study in the Belete-Gera Forest
- New Short Signature Scheme without Random Oracles
- AT-2-2 A Survey on Recent Advances in Broadcast Encryption
- Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)