Abstract
The issue of whether to add a "leap second" to square the clock with the Earth's orbit pits time specialists against IT.
- Finkleman, D., Allen, S., Seago, J., Seaman, R., and Seidelmann, P.K. The Future of Time: UTC and the Leap Second, American Scientist, 99, 312-319 (2011).Google ScholarCross Ref
- Kamp, P-H, The One-Second War, Communications of the ACM, 54, 44-48 (2011). Google ScholarDigital Library
- Nelson, R.A., McCarthy, D.D., Malys, S., Levine, J., Guinot, B., Fliegel, H.F., Beard R.L., and Bartholomew, T.R. The leap second: its history and possible future, Metrologia, 38, 509-529 (2011).Google ScholarCross Ref
- Beard, R. To abolish or not to abolish the leap second? The past and future of Coordinated Universal Time, ITU News, (2013) http://bit.ly/1FdX5t6.Google Scholar
- Leap Seconds, The UK Public Dialogue http://leapseconds.co.uk/reports-findings-dialogue/.Google Scholar
Index Terms
- Split second
Recommendations
Second-preimage analysis of reduced SHA-1
ACISP'10: Proceedings of the 15th Australasian conference on Information security and privacyMany applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-1 continues to be recommended in all applications except digital signatures ...
Second thoughts about a career in IT?
CITC5 '04: Proceedings of the 5th conference on Information technology educationAt a time of numerous reports of American IT jobs being outsourced overseas, and the immediate employment prospects for many IT graduates uncertain, it remains unclear whether these developments are causing American IT students to reconsider their ...
Second-Order differential collisions for reduced SHA-256
ASIACRYPT'11: Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information SecurityIn this work, we introduce a new non-random property for hash/compression functions using the theory of higher order differentials. Based on this, we show a second-order differential collision for the compression function of SHA-256 reduced to 47 out of ...
Comments