Search alternatives:
function composition » function decomposition, functional decomposition

1
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Gen-2 RFID System Against Security and Privacy Problems -- A Case Against Currently Used Hash...

2
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... and Sequence Compression Techniques -- Some Attacks on the Bit-Search Generator -- Hash Functions -- SMASH – A...

3
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... of Skipjack Reduced to 31 Rounds Using Impossible Differentials -- Hash Functions -- Software Performance...

4
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Smooth Projective Hashing for Conditionally Extractable Commitments...

5
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... Hash Functions in Prime Order Groups -- Hardness of Computing Individual Bits for One-Way Functions...

6
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks...

7
Published 2000
Springer Berlin Heidelberg
Table of Contents: ... Cryptography -- A Composition Theorem for Universal One-Way Hash Functions -- Exposure-Resilient Functions...

8
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... Revocation -- Priced Oblivious Transfer: How to Sell Digital Goods -- Signatures and Hash Functions -- A...

9
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Invited Lecture -- Cryptographic Functions and Design Criteria for Block Ciphers -- Hashing...

10
Published 1994
Springer Berlin Heidelberg
Table of Contents: ... -- On Families of Hash Functions via Geometric Codes and Concatenation -- On the Construction of Perfect...

11
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Standard -- Hash and Hash Chains -- A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1...

12
Published 2020
Springer International Publishing
Table of Contents: ... and Short Collisions in Merkle-Damgård Hash Functions -- The Summation-Truncation Hybrid: Reusing Discarded...

13
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Chosen-Ciphertext Security via Extractable Hash Proofs -- Attacks -- Factorization of a 768-Bit RSA...

14
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Foundation -- Efficient String-Commitment from Weak Bit-Commitment -- On the Static Diffie-Hellman Problem...

15
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking -- New...

16
Published 1990
Springer Berlin Heidelberg
Table of Contents: ...LEDA: A library of efficient data types and algorithms -- A new universal class of hash functions...

17
Published 1998
Springer Berlin Heidelberg
Table of Contents: ... construction of pseudo-random functions from MACs -- Many-to-one trapdoor functions and their relation...

18
Published 2001
Springer Berlin Heidelberg
Table of Contents: ... and about Universal Hash Functions & Hard Core Bits -- Pythagorean Triples in Unification Theory...

19
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... of Multiple Evidence Using a Functional Framework for IR -- Deriving TF-IDF as a Fisher Kernel -- Utilizing...

20
Published 1993
Springer Berlin Heidelberg
Table of Contents: ... processes -- Functionality decomposition by compositional correctness preserving transformation -- On model...