440 research outputs found

    Ultraviolet photography and spectroscopy using a spectrally selective image converter

    Get PDF
    Ultraviolet spectroscopy and photography using spectrally selective image converte

    A Handful of Providence: The Civil War Letters of Lt. Richard Goldwaite, New York Volunteers, and Ellen Goldwaite

    Get PDF
    Separation anxiety A universal story of love Negative comments have been made in recent years about the quality of some published Civil War letters. Historian Russel H. Beatie related how he used to scorn the slim volumes of letters from insignificant men about insignificant even...

    Manual for 70 mm hand-held photography from Skylab

    Get PDF
    A manual and atlas used on the Skylab mission for hand-held photography are presented. The manual covers terrain, environmental, meteorological, and dim light photography while the atlas covers sections from the Army Map Service 1:40.000,000 world map, a glossary of geologic terms, geologic maps, and recommended exposure times

    Efficient Construction of the Boomerang Connection Table

    Get PDF
    Recently, the Boomerang Connection Table was introduced by Cid et al. as a tool to better evaluate the probability of a boomerang distinguisher. To compute the BCT of an nn-bit to nn-bit S-box, the inventors of the BCT proposed an algorithm that takes O(23n)O(2^{3n}) time. We show that one can construct the same table in only O(22n)O(2^{2n}) time

    A Framework for Iterative Hash Functions - HAIFA

    Get PDF
    Since the seminal works of Merkle and Damgard on the iteration of compression functions, hash functions were built from compression functions using the Merkle-Damgard construction. Recently, several flaws in this construction were identified, allowing for pre-image attacks and second pre-image attacks on such hash functions even when the underlying compression functions are secure. In this paper we propose the HAsh Iterative FrAmework (HAIFA). Our framework can fix many of the flaws while supporting several additional properties such as defining families of hash functions and supporting variable hash size. HAIFA allows for an online computation of the hash function in one pass with a fixed amount of memory independently of the size of the message. Besides our proposal, the recent attacks initiated research on the way compression functions are to be iterated. We show that most recent proposals such as randomized hashing, the enveloped Merkle-Damgard, and the RMC and ROX modes can be all be instantiated as part of the HAsh Iterative FrAmework (HAIFA)
    corecore