Filters








3 Hits in 1.4 sec

Reducing the Collision Probability of Alleged Comp128 [chapter]

Helena Handschuh, Pascal Paillier
2000 Lecture Notes in Computer Science  
Identification Module) card by inducing collisions on the second (out of 40) round of the hash function.  ...  In this paper we suggest two different approaches to strengthen the alleged Comp128 algorithm with respect to this attack.  ...  An example of A3A8 is the Comp128 algorithm. An alleged version of Comp128 (we shall call it AComp128 hereafter) was recently published on the Web [1].  ... 
doi:10.1007/10721064_34 fatcat:2fc6jxweivce3c72zrebxp6fdi

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
We place an electronic version of this journal in the public domain one year after publication.  ...  The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication.  ...  of zero for MD4 reduced to the rst two rounds.  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

New Cryptanalysis and Modelling for Wireless Networking [article]

Mohamed Abdulla Hasan Saif Alzaabi, UH Research Archive, UH Research Archive
2016
This research project looks at the vulnerability of WiMAX 802.16e Subscriber Station/Mobile Station authentication at the initial entry and proposes approaches to the prevention of Denial of Service (DoS  ...  IEEE 802.16a, b, c & d versions were updated within three years of the first launch of WiMAX.  ...  COMP128) chosen by mobile operators UMTS/LTE provides a set of security features.  ... 
doi:10.18745/th.17115 fatcat:tkkyugyawzbjjbzhpjkkqmwesm