Keyword : cryptographic hash function


An Encryption-then-Compression System for JPEG/Motion JPEG Standard
Kenta KURIHARA Masanori KIKUCHI Shoko IMAIZUMI Sayaka SHIOTA Hitoshi KIYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/11/01
Vol. E98-A  No. 11 ; pp. 2238-2245
Type of Manuscript:  Special Section PAPER (Special Section on Smart Multimedia & Communication Systems)
Category: 
Keyword: 
Encryption-then-Compression systemperceptual encryptionJPEGcolor imagecryptographic hash function
 Summary | Full Text:PDF

A Security Analysis of Double-Block-Length Hash Functions with the Rate 1
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10 ; pp. 2575-2582
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
cryptographic hash functiondouble-block-length hash functioncompression function
 Summary | Full Text:PDF

Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 33-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
cryptographic hash functioncollision resistanceweak collision resistancesecond-preimage resistanceweak second-preimage resistance
 Summary | Full Text:PDF

Stolen-Verifier Attack on Two New Strong-Password Authentication Protocols
Chien-Ming CHEN Wei-Chi KU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/11/01
Vol. E85-B  No. 11 ; pp. 2519-2521
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
cryptographic hash functionstrong-password authenticationstolen-verifier attackreplay attack
 Summary | Full Text:PDF