Construction of universal one-way hash functions: tree hashing revisited (Q2384401): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.dam.2007.05.005 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2082663727 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364571 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4023519 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778848 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374928 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249649 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some observations on the theory of cryptographic hash functions / rank
 
Normal rank

Latest revision as of 10:05, 27 June 2024

scientific article
Language Label Description Also known as
English
Construction of universal one-way hash functions: tree hashing revisited
scientific article

    Statements

    Construction of universal one-way hash functions: tree hashing revisited (English)
    0 references
    0 references
    21 September 2007
    0 references
    A parallel algorithm for extending the domain of a universal one-way hash function is presented. This algorithm is based on a binary tree. For \(t\geq 2\), it extends the domain from the set of all \(n\)-bit strings to the set of all \(((2^t- 1)(n- m)+ m)\)-bit strings, where \(m\) is the length of the message digest. The associated increase in key length is \(2m\) bits for \(t= 2\); \(m(t+ 1)\) bits for \(3\leq t\leq 6\) and \(m(t+ \lfloor\log_2(t- 1)\rfloor)\) bits for \(t\geq 7\).
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    cryptographic hash functions
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references