440 research outputs found
Ultraviolet photography and spectroscopy using a spectrally selective image converter
Ultraviolet spectroscopy and photography using spectrally selective image converte
A Handful of Providence: The Civil War Letters of Lt. Richard Goldwaite, New York Volunteers, and Ellen Goldwaite
Separation anxiety A universal story of love Negative comments have been made in recent years about the quality of some published Civil War letters. Historian Russel H. Beatie related how he used to scorn the slim volumes of letters from insignificant men about insignificant even...
Hardtack and Sauerkraut Stew: Ethnic Tensions in the 154th New York Volunteers, Eleventh Corps, during the Civil War
Manual for 70 mm hand-held photography from Skylab
A manual and atlas used on the Skylab mission for hand-held photography are presented. The manual covers terrain, environmental, meteorological, and dim light photography while the atlas covers sections from the Army Map Service 1:40.000,000 world map, a glossary of geologic terms, geologic maps, and recommended exposure times
Efficient Construction of the Boomerang Connection Table
Recently, the Boomerang Connection Table was introduced by Cid et al. as a tool to better evaluate the probability of a boomerang distinguisher. To compute the BCT of an -bit to -bit S-box, the inventors of the BCT proposed an algorithm that takes time. We show that one can construct the same table in only time
A Framework for Iterative Hash Functions - HAIFA
Since the seminal works of Merkle and Damgard on the iteration of compression functions, hash functions were built from compression functions using the Merkle-Damgard construction. Recently, several flaws in this construction were identified, allowing for pre-image attacks and second pre-image attacks on such hash functions even when the underlying compression functions are secure.
In this paper we propose the HAsh Iterative FrAmework (HAIFA). Our framework can fix many of the flaws while supporting several additional properties such as defining families of hash functions and supporting variable hash size. HAIFA allows for an online computation of the hash function in one pass with a fixed amount of memory independently of the size of the message.
Besides our proposal, the recent attacks initiated research on the way compression functions are to be iterated. We show that most recent proposals such as randomized hashing, the enveloped Merkle-Damgard, and the RMC and ROX modes can be all be instantiated as part of the HAsh Iterative FrAmework (HAIFA)
- …