Cryptographic hash functions from expander graphs (Q1027970): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Import241208061232 (talk | contribs)
Normalize DOI.
 
(6 intermediate revisions by 5 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s00145-007-9002-x / rank
Normal rank
 
Property / author
 
Property / author: Denis Xavier Charles / rank
Normal rank
 
Property / author
 
Property / author: Denis Xavier Charles / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: Publication / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-007-9002-x / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2000932900 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of the Hashing Scheme Based on SL 2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Eigenvalues and expanders / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4265362 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast algorithms for computing isogenies between elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5482338 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Modular Polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking the SL 2 hashing scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: VSH, an Efficient and Provable Collision-Resistant Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quaternäre quadratische Formen und die Riemannsche Vermutung für die Kongruenzzetafunktion / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing Isogenies between Elliptic Curves Over Finite Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3760606 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Rigorous Subexponential Algorithm For Computation of Class Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707418 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Discrete Logarithm Variants of VSH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ramanujan graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: An algorithm for computing modular forms on \(\Gamma_0(N)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ramanujan graphs and Hecke operators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3999365 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correspondances modulaires et les fonctions \(\zeta\) de courbes algébriques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3710637 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536808 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5631239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash functions and Cayley graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4954415 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S00145-007-9002-X / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 14:42, 10 December 2024

scientific article
Language Label Description Also known as
English
Cryptographic hash functions from expander graphs
scientific article

    Statements

    Cryptographic hash functions from expander graphs (English)
    0 references
    0 references
    0 references
    0 references
    30 June 2009
    0 references
    cryptographic hash functions
    0 references
    expander graphs
    0 references
    elliptic curve cryptography
    0 references
    isogenies
    0 references
    Ramanujan graphs
    0 references
    supersingular elliptic curves
    0 references

    Identifiers