CN101300569B - 用于从扩展图构造散列函数的系统和方法 - Google Patents
用于从扩展图构造散列函数的系统和方法 Download PDFInfo
- Publication number
- CN101300569B CN101300569B CN2006800404564A CN200680040456A CN101300569B CN 101300569 B CN101300569 B CN 101300569B CN 2006800404564 A CN2006800404564 A CN 2006800404564A CN 200680040456 A CN200680040456 A CN 200680040456A CN 101300569 B CN101300569 B CN 101300569B
- Authority
- CN
- China
- Prior art keywords
- walkthrough
- summit
- hash function
- expander graphs
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9014—Indexing; Data structures therefor; Storage structures hash tables
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Power Engineering (AREA)
- Mathematical Physics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/263,701 US7382876B2 (en) | 2005-11-01 | 2005-11-01 | Hash function constructions from expander graphs |
| US11/263,701 | 2005-11-01 | ||
| PCT/US2006/040538 WO2007053295A1 (en) | 2005-11-01 | 2006-10-16 | Hash function constructions from expander graphs |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN101300569A CN101300569A (zh) | 2008-11-05 |
| CN101300569B true CN101300569B (zh) | 2010-06-16 |
Family
ID=37996294
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2006800404564A Expired - Fee Related CN101300569B (zh) | 2005-11-01 | 2006-10-16 | 用于从扩展图构造散列函数的系统和方法 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US7382876B2 (enExample) |
| EP (1) | EP1949255A4 (enExample) |
| JP (1) | JP4455661B2 (enExample) |
| KR (1) | KR101292927B1 (enExample) |
| CN (1) | CN101300569B (enExample) |
| WO (1) | WO2007053295A1 (enExample) |
Families Citing this family (30)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6842459B1 (en) | 2000-04-19 | 2005-01-11 | Serconet Ltd. | Network combining wired and non-wired segments |
| US7680871B2 (en) * | 2006-01-19 | 2010-03-16 | Microsoft Corporation | Approximating function properties with expander graphs |
| US8130955B2 (en) * | 2007-12-21 | 2012-03-06 | Spansion Llc | Random number generation through use of memory cell activity |
| US8114117B2 (en) * | 2008-09-30 | 2012-02-14 | Tyco Healthcare Group Lp | Compression device with wear area |
| US7961734B2 (en) * | 2008-09-30 | 2011-06-14 | Juniper Networks, Inc. | Methods and apparatus related to packet classification associated with a multi-stage switch |
| US8798057B1 (en) | 2008-09-30 | 2014-08-05 | Juniper Networks, Inc. | Methods and apparatus to implement except condition during data packet classification |
| US7835357B2 (en) * | 2008-09-30 | 2010-11-16 | Juniper Networks, Inc. | Methods and apparatus for packet classification based on policy vectors |
| US7738454B1 (en) | 2008-09-30 | 2010-06-15 | Juniper Networks, Inc. | Methods and apparatus related to packet classification based on range values |
| US7796541B1 (en) | 2008-09-30 | 2010-09-14 | Juniper Networks, Inc. | Methods and apparatus for range matching during packet classification based on a linked-node structure |
| US8675648B1 (en) | 2008-09-30 | 2014-03-18 | Juniper Networks, Inc. | Methods and apparatus for compression in packet classification |
| US8804950B1 (en) | 2008-09-30 | 2014-08-12 | Juniper Networks, Inc. | Methods and apparatus for producing a hash value based on a hash function |
| US20100115276A1 (en) * | 2008-10-31 | 2010-05-06 | Apple Inc. | System and method for derivating deterministic binary values |
| US8184803B2 (en) * | 2008-12-29 | 2012-05-22 | King Fahd University Of Petroleum And Minerals | Hash functions using elliptic curve cryptography |
| US8111697B1 (en) | 2008-12-31 | 2012-02-07 | Juniper Networks, Inc. | Methods and apparatus for packet classification based on multiple conditions |
| US8488588B1 (en) | 2008-12-31 | 2013-07-16 | Juniper Networks, Inc. | Methods and apparatus for indexing set bit values in a long vector associated with a switch fabric |
| US7889741B1 (en) | 2008-12-31 | 2011-02-15 | Juniper Networks, Inc. | Methods and apparatus for packet classification based on multiple conditions |
| US8363825B1 (en) | 2009-05-21 | 2013-01-29 | The United States Of America As Represented By The Director, National Security Agency | Device for and method of collision-free hashing for near-match inputs |
| US20110055581A1 (en) * | 2009-08-31 | 2011-03-03 | Apple Inc. | Hash function based on painting techniques |
| US8953603B2 (en) | 2009-10-28 | 2015-02-10 | Juniper Networks, Inc. | Methods and apparatus related to a distributed switch fabric |
| US9282060B2 (en) | 2010-12-15 | 2016-03-08 | Juniper Networks, Inc. | Methods and apparatus for dynamic resource management within a distributed control plane of a switch |
| US8731187B2 (en) * | 2010-12-21 | 2014-05-20 | Microsoft Corporation | Computing genus-2 curves using general isogenies |
| US9230548B2 (en) * | 2012-06-06 | 2016-01-05 | Cypress Semiconductor Corporation | Hybrid hashing scheme for active HMMS |
| US8812935B2 (en) | 2012-08-02 | 2014-08-19 | Oracle International Corporation | Using a data ECC to detect address corruption |
| JP6614979B2 (ja) * | 2016-01-15 | 2019-12-04 | 三菱電機株式会社 | 暗号装置、暗号方法及び暗号プログラム |
| US10673631B2 (en) * | 2016-11-07 | 2020-06-02 | Infosec Global Inc. | Elliptic curve isogeny-based cryptographic scheme |
| KR101878213B1 (ko) * | 2017-03-24 | 2018-07-13 | 경희대학교 산학협력단 | 가중치 그래프를 요약하는 방법, 장치 및 컴퓨터 프로그램 |
| US11531859B2 (en) | 2017-08-08 | 2022-12-20 | Samsung Electronics Co., Ltd. | System and method for hashed compressed weighting matrix in neural networks |
| KR102009216B1 (ko) * | 2018-05-14 | 2019-08-09 | 경희대학교 산학협력단 | 그래프 요약 및 압축 방법 및 시스템 |
| WO2023287427A1 (en) * | 2021-07-16 | 2023-01-19 | Pqsecure Technologies, Llc | A method and system for computing large-degree isogenies with an odd degree |
| US20240004933A1 (en) * | 2022-06-29 | 2024-01-04 | Tigergraph, Inc. | Minhash signatures as vertices for fuzzy string match on graph |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1236454A (zh) * | 1997-06-05 | 1999-11-24 | 微软公司 | 使用位移表建立一个完备的散列 |
| US6104811A (en) * | 1996-08-16 | 2000-08-15 | Telcordia Technologies, Inc. | Cryptographically secure pseudo-random bit generator for fast and secure encryption |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5515307A (en) * | 1994-08-04 | 1996-05-07 | Bell Communications Research, Inc. | Pseudo-random generator |
| US6757686B1 (en) | 2000-06-14 | 2004-06-29 | International Business Machines Corporation | Method and apparatus for representing database and query information using interval hash tree |
| US7120856B2 (en) * | 2002-09-25 | 2006-10-10 | Leanics Corporation | LDPC code and encoder/decoder regarding same |
| US6988180B2 (en) | 2003-09-29 | 2006-01-17 | Microsoft Corporation | Method and apparatus for lock-free, non-blocking hash table |
| US7289629B2 (en) * | 2004-02-09 | 2007-10-30 | Microsoft Corporation | Primitives for fast secure hash functions and stream ciphers |
-
2005
- 2005-11-01 US US11/263,701 patent/US7382876B2/en not_active Expired - Fee Related
-
2006
- 2006-10-16 WO PCT/US2006/040538 patent/WO2007053295A1/en not_active Ceased
- 2006-10-16 JP JP2008538904A patent/JP4455661B2/ja not_active Expired - Fee Related
- 2006-10-16 KR KR1020087009948A patent/KR101292927B1/ko not_active Expired - Fee Related
- 2006-10-16 CN CN2006800404564A patent/CN101300569B/zh not_active Expired - Fee Related
- 2006-10-16 EP EP06826109A patent/EP1949255A4/en not_active Withdrawn
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6104811A (en) * | 1996-08-16 | 2000-08-15 | Telcordia Technologies, Inc. | Cryptographically secure pseudo-random bit generator for fast and secure encryption |
| CN1236454A (zh) * | 1997-06-05 | 1999-11-24 | 微软公司 | 使用位移表建立一个完备的散列 |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2007053295A1 (en) | 2007-05-10 |
| KR20080063785A (ko) | 2008-07-07 |
| US20070098150A1 (en) | 2007-05-03 |
| JP2009514036A (ja) | 2009-04-02 |
| JP4455661B2 (ja) | 2010-04-21 |
| EP1949255A1 (en) | 2008-07-30 |
| EP1949255A4 (en) | 2009-12-23 |
| US7382876B2 (en) | 2008-06-03 |
| CN101300569A (zh) | 2008-11-05 |
| KR101292927B1 (ko) | 2013-08-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101300569B (zh) | 用于从扩展图构造散列函数的系统和方法 | |
| EP3692681B1 (en) | A system and method for quantum-safe authentication, encryption and decryption of information | |
| Aumasson et al. | NORX: parallel and scalable AEAD | |
| JP7209431B2 (ja) | デジタル署名方法、署名情報の検証方法、関連装置及び電子機器 | |
| Bakiri et al. | A hardware and secure pseudorandom generator for constrained devices | |
| Karmakar et al. | Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on the Falcon signature scheme | |
| Warnow et al. | Absolute convergence: true trees from short sequences | |
| Banik et al. | A chosen IV related key attack on Grain-128a | |
| CN101741560A (zh) | 基于整数非线性映射的散列函数构造方法 | |
| Ye et al. | Revisit division property based cube attacks: key-recovery or distinguishing attacks? | |
| Bhattacharjee et al. | Unified GPU technique to boost confidentiality, integrity and trim data loss in big data transmission | |
| US8824677B1 (en) | Provably secure and efficient pseudorandom number generation | |
| Chattopadhyay et al. | Improved extractors for small-space sources | |
| CN114157431A (zh) | 基于多变量签名方法的区块链交易处理方法及计算机设备 | |
| US7296163B2 (en) | System and methods for encrypted execution of computer programs | |
| Parsonage et al. | Fast generation of spatially embedded random networks | |
| Guyeux et al. | A Topological Study of Chaotic Iterations Application to Hash Functions | |
| CN116318660A (zh) | 一种消息扩展与压缩方法及相关装置 | |
| Applebaum et al. | Cryptography by cellular automata or how fast can complexity emerge in nature? | |
| Gorbenko et al. | Methods of building general parameters and keys for NTRU Prime Ukraine of 5 th–7 th levels of stability. Product form | |
| Joux | A Tutorial on High Performance Computing Applied to Cryptanalysis: (Invited Talk Abstract) | |
| Assadi et al. | Correlation Clustering and (De) Sparsification: Graph Sketches Can Match Classical Algorithms | |
| US11210428B2 (en) | Long-term on-demand service for executing active-secure computations | |
| Aleksandersen et al. | Searching for APN functions by polynomial expansion | |
| Chowdhury et al. | Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150506 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20150506 Address after: Washington State Patentee after: Micro soft technique license Co., Ltd Address before: Washington State Patentee before: Microsoft Corp. |
|
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100616 Termination date: 20151016 |
|
| EXPY | Termination of patent right or utility model |