Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Cryptographically strong

M. Blum and S. Micali, How to Generate Cryptographically Strong Sequences of Pseudo Random Bits, SIAM J. Compt, Vol. 13, pp. 850-864, 1984. [Pg.31]

Moreover, [DaPP94] contains a construction from an arbitrary so-called collision-intractable family of hash functions, which is fairly efficient at least if one trusts a fast, but not cryptographically strong hash function, and may therefore be a reasonable alternative if number-theoretic assumptions should be disproved. [Pg.131]


See other pages where Cryptographically strong is mentioned: [Pg.26]    [Pg.26]    [Pg.27]    [Pg.28]    [Pg.30]    [Pg.108]    [Pg.130]    [Pg.144]    [Pg.374]    [Pg.26]    [Pg.26]    [Pg.27]    [Pg.28]    [Pg.30]    [Pg.108]    [Pg.130]    [Pg.144]    [Pg.374]    [Pg.161]    [Pg.3]    [Pg.64]    [Pg.76]   
See also in sourсe #XX -- [ Pg.26 ]




SEARCH



Cryptographers

© 2024 chempedia.info