搜索结果: 1-5 共查到“军事学 AURORA”相关记录5条 . 查询时间(0.078 秒)
Aurora: Transparent Succinct Arguments for R1CS
zero knowledge interactive oracle proofs succinct arguments
2018/11/16
We design, implement, and evaluate a zero knowledge succinct non-interactive argument (SNARG) for Rank-1 Constraint Satisfaction (R1CS), a widely-deployed NP language undergoing standardization. Our S...
In this note, we present a full key recovery attack on HMACAURORA-
512 when 512-bit secret keys are used and the MAC length
is 512-bit long. Our attack requires 2257 queries and the off-line complex...
Attacks on AURORA-512 and the Double-MIX Merkle-Damgard Transform
Attacks AURORA-512 Double-MIX Merkle-Damgard Transform
2009/6/12
We analyse the Double-Mix Merkle-Damgard construction (DMMD) used in the AURORA
family of hash functions. We show that DMMD falls short of providing the expected level
of security. Specifically, we...
In this note, we present a 2nd-preimage attack on AURORA-
512, which is one of the candidates for SHA-3. Our attack can generate
2nd-preimages of any given message, in particular, the attack complex...
In this note, we present a collision attack on AURORA-512,
which is one of the candidates for SHA-3. The attack complexity is approximately
2236 AURORA-512 operations, which is less than the birthda...