329 resultados para Empirical Functions


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background and Purpose: - This paper focuses on the learning culture within the high performance levels of rowing. In doing so, we explore the case of an individual’s learning as he moves across athletic, coaching and administrative functions. This exploration draws on a cultural learning framework and complementary theorisings related to reflexivity. Method - This study makes use of an intellectually, morally and collaboratively challenging approach whereby one member of the research team was also the sole participant of this study. The participant’s careers as a high performance athlete, coach and administrator, coupled with his experience in conducting empirical research presented a rare opportunity to engage in collaborative research (involving degrees of insider and outsider status for each of the research team). We acknowledge that others have looked to combine roles of coach / athlete / administrator with that of researcher however few (if any) have attempted to combine them all in one project. Moreover, coupled with the approach to reflexivity adopted in this study and the authorship contributions we consider this scholarly direction uncommon. Data were comprised of recorded research conversations, a subsequently constructed learning narrative, reflections on the narrative, a stimulated reflective piece from the participant, and a final (re)construction of the participant’s story. Accordingly, data were integrated through an iterative process of thematic analysis. Results - The cultural (i.e., the ways things get done) and structural (e.g., the rules and regulations) properties of high performance rowing were found to shape both the opportunities to be present (e.g., secure a place in the crew) and to learn (e.g., learn the skills required to perform at an Olympic level). However, the individual’s personal properties were brought to bear on re-shaping the constraints such that many limitations could be overcome. In keeping with the theory of learning cultures, the culture of rowing was found to position individuals (a coxswain in this case) differentially. In a similar manner, a range of structural features was found to be important in shaping the cultural and personal elements in performance contexts. For example, the ‘field of play’ was found to be important as a structural feature (i.e., inability of coach to communicate with athletes) in shaping the cultural and personal elements of learning in competition (e.g., positioning the coxswain as an in-boat coach and trusted crewmate). Finally, the cultural and structural elements in rowing appeared to be activated by the participant’s personal elements, most notably his orientation towards quality performance. Conclusion - The participant in this study was found to be driven by the project that he cares about most and at each turn he has bent his understanding of his sport back on itself to see if he can find opportunities to learn and subsequently explore ways to improve performance. The story here emphasises the importance of learner agency, and this is an aspect that has often been missing in recent theorising about learning. In this study, we find an agent using his ‘personal emergent powers to activate the resources in the culture and structure of his sport in an attempt to improve performance. We conclude from this account that this particular high performance rowing culture is one that provided support but nonetheless encouraged those involved, to ‘figure things out’ for themselves – be it as athletes, coaches and/or administrators.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines whether investors are able to generate abnormal risk-adjusted returns in the Australian market based on media-specific firm reputational factors under market uncertainty between 2004 and 2012. The findings suggest that after controlling for crisis-centric time periods and market risk factors, contrarian trading strategies produce abnormal returns for poor corporate reputation firms but not for their good corporate reputation counterparts. Corporate reputation may be a driver of performance for poorly performing Australian firms and could be considered a stimulus for trading activity due to its explanatory capabilities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article analyses the effects of NGO microfinance programmes on household welfare in Vietnam. Data on 470 households across 25 villages were collected using a quasi-experimental survey approach to overcome any self-selection bias. The sample was designed so that member households of microfinance programmes were compared with non-member households with similar characteristics. The analysis shows no significant effects of participation in NGO microfinance on household welfare, proxied by income and consumption per adult equivalent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is commonly perceived that variables ‘measuring’ different dimensions of teaching (construed as instructional attributes) used in student evaluation of teaching (SET) questionnaires are so highly correlated that they pose a serious multicollinearity problem for quantitative analysis including regression analysis. Using nearly 12000 individual student responses to SET questionnaires and ten key dimensions of teaching and 25 courses at various undergraduate and postgraduate levels for multiple years at a large Australian university, this paper investigates whether this is indeed the case and if so under what circumstances. This paper tests this proposition first by examining variance inflation factors (VIFs), across courses, levels and over time using individual responses; and secondly by using class averages. In the first instance, the paper finds no sustainable evidence of multicollinearity. While, there were one or two isolated cases of VIFs marginally exceeding the conservative threshold of 5, in no cases did the VIFs for any of the instructional attributes come anywhere close to the high threshold value of 10. In the second instance, however, the paper finds that the attributes are highly correlated as all the VIFs exceed 10. These findings have two implications: (a) given the ordinal nature of the data ordered probit analysis using individual student responses can be employed to quantify the impact of instructional attributes on TEVAL score; (b) Data based on class averages cannot be used for probit analysis. An illustrative exercise using level 2 undergraduate courses data suggests higher TEVAL scores depend first and foremost on improving explanation, presentation, and organization of lecture materials.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vehicle speed is an important attribute for analysing the utility of a transport mode. The speed relationship between multiple modes of transport is of interest to traffic planners and operators. This paper quantifies the relationship between bus speed and average car speed by integrating Bluetooth data and Transit Signal Priority data from the urban network in Brisbane, Australia. The method proposed in this paper is the first of its kind to relate bus speed and average car speed by integrating multi-source traffic data in a corridor-based method. Three transferable regression models relating not-in-service bus, in-service bus during peak periods, and in-service bus during off-peak periods with average car speed are proposed. The models are cross-validated and the interrelationships are significant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research quantifies traffic congestion and travel time reliability with case study on a major arterial road in Brisbane. The focus is on the analysis of impact of incidents (e.g., road accidents) on travel time reliability. Real traffic (Bluetooth) and incident records from Coronation Drive, Brisbane are utilized for the study. The findings include significant impact of incidents on traffic congestion and travel time reliability. The knowledge gained is useful in various applications such as traveler information systems, and cost-benefit analysis of various strategies to reduce the traffic incidents and its' impacts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract - English Multiple literacies refers to reading, reading the world and self. This article proposes an understanding of reading that goes beyond its definition in psychology and applied linguistics. This longitudinal project is interested in a conceptualisation of what reading is, how it functions and what it produces in becoming multilingual. Reading is explored through the lens of an empirical study involving five female pupils from senior Kindergarten to Grade 3 observed and interviewed in relation to activities at school and at home. The study took place in Ottawa schools where French is the sole language of instruction. Reading in the context of multiple literacies is conceptualised to disrupt /deterritorialise and to be immanent, offering the potentiality to go beyond what is to what could be. Becoming multilingual is a continuous movement involving networks of rhizomatic connections and reading the world and self. Résumé - Francais Les littératies multiples se réfèrent à la lecture, la lecture du monde et la lecture de soi. Cet article propose une compréhension de la lecture qui dépasse sa définition usuelle en psychologie et en linguistique appliquée. Ce projet longitudinal porte sur la conceptualisation de la lecture, son fonctionnement et ce qu’elle produit dans le devenir plurilingue. La lecture est examinée selon l’optique d’une étude empirique durant laquelle cinq écolières du jardin d’enfants à la 3e année étaient observées et interviewées par rapport à des activités à l’école et à la maison. L’étude a eu lieu dans des écoles d’Ottawa dont la seule langue d’enseignement est le français. Dans le contexte des littératies multiples, la lecture est conceptualisée comme étant perturbatrice/déterritorialisante et immanente. Elle offre la potentialité d’aller au-delà de ce qui est vers ce qui pourrait être. Devenir plurilingue est un mouvement continu faisant appel à des réseaux de connexions rhizomatiques et à la lecture du monde et de soi.