CN101300569B - 用于从扩展图构造散列函数的系统和方法 - Google Patents

用于从扩展图构造散列函数的系统和方法 Download PDF

Info

Publication number
CN101300569B
CN101300569B CN2006800404564A CN200680040456A CN101300569B CN 101300569 B CN101300569 B CN 101300569B CN 2006800404564 A CN2006800404564 A CN 2006800404564A CN 200680040456 A CN200680040456 A CN 200680040456A CN 101300569 B CN101300569 B CN 101300569B
Authority
CN
China
Prior art keywords
walkthrough
summit
hash function
expander graphs
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006800404564A
Other languages
English (en)
Chinese (zh)
Other versions
CN101300569A (zh
Inventor
K·E·劳特
D·X·查尔斯
E·Z·戈伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN101300569A publication Critical patent/CN101300569A/zh
Application granted granted Critical
Publication of CN101300569B publication Critical patent/CN101300569B/zh
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Mathematical Physics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
CN2006800404564A 2005-11-01 2006-10-16 用于从扩展图构造散列函数的系统和方法 Expired - Fee Related CN101300569B (zh)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11/263,701 US7382876B2 (en) 2005-11-01 2005-11-01 Hash function constructions from expander graphs
US11/263,701 2005-11-01
PCT/US2006/040538 WO2007053295A1 (en) 2005-11-01 2006-10-16 Hash function constructions from expander graphs

Publications (2)

Publication Number Publication Date
CN101300569A CN101300569A (zh) 2008-11-05
CN101300569B true CN101300569B (zh) 2010-06-16

Family

ID=37996294

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006800404564A Expired - Fee Related CN101300569B (zh) 2005-11-01 2006-10-16 用于从扩展图构造散列函数的系统和方法

Country Status (6)

Country Link
US (1) US7382876B2 (enExample)
EP (1) EP1949255A4 (enExample)
JP (1) JP4455661B2 (enExample)
KR (1) KR101292927B1 (enExample)
CN (1) CN101300569B (enExample)
WO (1) WO2007053295A1 (enExample)

Families Citing this family (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6842459B1 (en) 2000-04-19 2005-01-11 Serconet Ltd. Network combining wired and non-wired segments
US7680871B2 (en) * 2006-01-19 2010-03-16 Microsoft Corporation Approximating function properties with expander graphs
US8130955B2 (en) * 2007-12-21 2012-03-06 Spansion Llc Random number generation through use of memory cell activity
US8114117B2 (en) * 2008-09-30 2012-02-14 Tyco Healthcare Group Lp Compression device with wear area
US7961734B2 (en) * 2008-09-30 2011-06-14 Juniper Networks, Inc. Methods and apparatus related to packet classification associated with a multi-stage switch
US8798057B1 (en) 2008-09-30 2014-08-05 Juniper Networks, Inc. Methods and apparatus to implement except condition during data packet classification
US7835357B2 (en) * 2008-09-30 2010-11-16 Juniper Networks, Inc. Methods and apparatus for packet classification based on policy vectors
US7738454B1 (en) 2008-09-30 2010-06-15 Juniper Networks, Inc. Methods and apparatus related to packet classification based on range values
US7796541B1 (en) 2008-09-30 2010-09-14 Juniper Networks, Inc. Methods and apparatus for range matching during packet classification based on a linked-node structure
US8675648B1 (en) 2008-09-30 2014-03-18 Juniper Networks, Inc. Methods and apparatus for compression in packet classification
US8804950B1 (en) 2008-09-30 2014-08-12 Juniper Networks, Inc. Methods and apparatus for producing a hash value based on a hash function
US20100115276A1 (en) * 2008-10-31 2010-05-06 Apple Inc. System and method for derivating deterministic binary values
US8184803B2 (en) * 2008-12-29 2012-05-22 King Fahd University Of Petroleum And Minerals Hash functions using elliptic curve cryptography
US8111697B1 (en) 2008-12-31 2012-02-07 Juniper Networks, Inc. Methods and apparatus for packet classification based on multiple conditions
US8488588B1 (en) 2008-12-31 2013-07-16 Juniper Networks, Inc. Methods and apparatus for indexing set bit values in a long vector associated with a switch fabric
US7889741B1 (en) 2008-12-31 2011-02-15 Juniper Networks, Inc. Methods and apparatus for packet classification based on multiple conditions
US8363825B1 (en) 2009-05-21 2013-01-29 The United States Of America As Represented By The Director, National Security Agency Device for and method of collision-free hashing for near-match inputs
US20110055581A1 (en) * 2009-08-31 2011-03-03 Apple Inc. Hash function based on painting techniques
US8953603B2 (en) 2009-10-28 2015-02-10 Juniper Networks, Inc. Methods and apparatus related to a distributed switch fabric
US9282060B2 (en) 2010-12-15 2016-03-08 Juniper Networks, Inc. Methods and apparatus for dynamic resource management within a distributed control plane of a switch
US8731187B2 (en) * 2010-12-21 2014-05-20 Microsoft Corporation Computing genus-2 curves using general isogenies
US9230548B2 (en) * 2012-06-06 2016-01-05 Cypress Semiconductor Corporation Hybrid hashing scheme for active HMMS
US8812935B2 (en) 2012-08-02 2014-08-19 Oracle International Corporation Using a data ECC to detect address corruption
JP6614979B2 (ja) * 2016-01-15 2019-12-04 三菱電機株式会社 暗号装置、暗号方法及び暗号プログラム
US10673631B2 (en) * 2016-11-07 2020-06-02 Infosec Global Inc. Elliptic curve isogeny-based cryptographic scheme
KR101878213B1 (ko) * 2017-03-24 2018-07-13 경희대학교 산학협력단 가중치 그래프를 요약하는 방법, 장치 및 컴퓨터 프로그램
US11531859B2 (en) 2017-08-08 2022-12-20 Samsung Electronics Co., Ltd. System and method for hashed compressed weighting matrix in neural networks
KR102009216B1 (ko) * 2018-05-14 2019-08-09 경희대학교 산학협력단 그래프 요약 및 압축 방법 및 시스템
WO2023287427A1 (en) * 2021-07-16 2023-01-19 Pqsecure Technologies, Llc A method and system for computing large-degree isogenies with an odd degree
US20240004933A1 (en) * 2022-06-29 2024-01-04 Tigergraph, Inc. Minhash signatures as vertices for fuzzy string match on graph

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1236454A (zh) * 1997-06-05 1999-11-24 微软公司 使用位移表建立一个完备的散列
US6104811A (en) * 1996-08-16 2000-08-15 Telcordia Technologies, Inc. Cryptographically secure pseudo-random bit generator for fast and secure encryption

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5515307A (en) * 1994-08-04 1996-05-07 Bell Communications Research, Inc. Pseudo-random generator
US6757686B1 (en) 2000-06-14 2004-06-29 International Business Machines Corporation Method and apparatus for representing database and query information using interval hash tree
US7120856B2 (en) * 2002-09-25 2006-10-10 Leanics Corporation LDPC code and encoder/decoder regarding same
US6988180B2 (en) 2003-09-29 2006-01-17 Microsoft Corporation Method and apparatus for lock-free, non-blocking hash table
US7289629B2 (en) * 2004-02-09 2007-10-30 Microsoft Corporation Primitives for fast secure hash functions and stream ciphers

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6104811A (en) * 1996-08-16 2000-08-15 Telcordia Technologies, Inc. Cryptographically secure pseudo-random bit generator for fast and secure encryption
CN1236454A (zh) * 1997-06-05 1999-11-24 微软公司 使用位移表建立一个完备的散列

Also Published As

Publication number Publication date
WO2007053295A1 (en) 2007-05-10
KR20080063785A (ko) 2008-07-07
US20070098150A1 (en) 2007-05-03
JP2009514036A (ja) 2009-04-02
JP4455661B2 (ja) 2010-04-21
EP1949255A1 (en) 2008-07-30
EP1949255A4 (en) 2009-12-23
US7382876B2 (en) 2008-06-03
CN101300569A (zh) 2008-11-05
KR101292927B1 (ko) 2013-08-02

Similar Documents

Publication Publication Date Title
CN101300569B (zh) 用于从扩展图构造散列函数的系统和方法
EP3692681B1 (en) A system and method for quantum-safe authentication, encryption and decryption of information
Aumasson et al. NORX: parallel and scalable AEAD
JP7209431B2 (ja) デジタル署名方法、署名情報の検証方法、関連装置及び電子機器
Bakiri et al. A hardware and secure pseudorandom generator for constrained devices
Karmakar et al. Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on the Falcon signature scheme
Warnow et al. Absolute convergence: true trees from short sequences
Banik et al. A chosen IV related key attack on Grain-128a
CN101741560A (zh) 基于整数非线性映射的散列函数构造方法
Ye et al. Revisit division property based cube attacks: key-recovery or distinguishing attacks?
Bhattacharjee et al. Unified GPU technique to boost confidentiality, integrity and trim data loss in big data transmission
US8824677B1 (en) Provably secure and efficient pseudorandom number generation
Chattopadhyay et al. Improved extractors for small-space sources
CN114157431A (zh) 基于多变量签名方法的区块链交易处理方法及计算机设备
US7296163B2 (en) System and methods for encrypted execution of computer programs
Parsonage et al. Fast generation of spatially embedded random networks
Guyeux et al. A Topological Study of Chaotic Iterations Application to Hash Functions
CN116318660A (zh) 一种消息扩展与压缩方法及相关装置
Applebaum et al. Cryptography by cellular automata or how fast can complexity emerge in nature?
Gorbenko et al. Methods of building general parameters and keys for NTRU Prime Ukraine of 5 th–7 th levels of stability. Product form
Joux A Tutorial on High Performance Computing Applied to Cryptanalysis: (Invited Talk Abstract)
Assadi et al. Correlation Clustering and (De) Sparsification: Graph Sketches Can Match Classical Algorithms
US11210428B2 (en) Long-term on-demand service for executing active-secure computations
Aleksandersen et al. Searching for APN functions by polynomial expansion
Chowdhury et al. Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150506

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150506

Address after: Washington State

Patentee after: Micro soft technique license Co., Ltd

Address before: Washington State

Patentee before: Microsoft Corp.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100616

Termination date: 20151016

EXPY Termination of patent right or utility model