20,114 research outputs found
On hash functions using checksums
We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel
Compressing Binary Decision Diagrams
The paper introduces a new technique for compressing Binary Decision Diagrams
in those cases where random access is not required. Using this technique,
compression and decompression can be done in linear time in the size of the BDD
and compression will in many cases reduce the size of the BDD to 1-2 bits per
node. Empirical results for our compression technique are presented, including
comparisons with previously introduced techniques, showing that the new
technique dominate on all tested instances.Comment: Full (tech-report) version of ECAI 2008 short pape
Point and interval estimates of abundance using multiple covariate distance sampling: an example using great bustards.
Previously in the University eprints HAIRST pilot service at http://eprints.st-andrews.ac.uk/archive/00000447/The pdf file contains the tech report, the ASCII (.R) file contains the accompanying R code.Description of computations to produce sex-specific estimates of density from a multiple-covariate distance sampling analysis. Program Distance 5.0 has limited capacity to bootstrap certain types of analytical situations (e.g., cluster size as a covariate). Herein I describe steps and code to perform an analysis of this sort. Possible ways to adapt this code for similar analyses are described.Postprin
Mirrored Light Field Video Camera Adapter
This paper proposes the design of a custom mirror-based light field camera
adapter that is cheap, simple in construction, and accessible. Mirrors of
different shape and orientation reflect the scene into an upwards-facing camera
to create an array of virtual cameras with overlapping field of view at
specified depths, and deliver video frame rate light fields. We describe the
design, construction, decoding and calibration processes of our mirror-based
light field camera adapter in preparation for an open-source release to benefit
the robotic vision community.Comment: tech report, v0.5, 15 pages, 6 figure
- …