Cryptographic hash functions from expander graphs (Q1027970): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: On the Security of the Hashing Scheme Based on SL 2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Eigenvalues and expanders / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4265362 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast algorithms for computing isogenies between elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5482338 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Modular Polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking the SL 2 hashing scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: VSH, an Efficient and Provable Collision-Resistant Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quaternäre quadratische Formen und die Riemannsche Vermutung für die Kongruenzzetafunktion / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing Isogenies between Elliptic Curves Over Finite Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3760606 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Rigorous Subexponential Algorithm For Computation of Class Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707418 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Discrete Logarithm Variants of VSH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ramanujan graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: An algorithm for computing modular forms on \(\Gamma_0(N)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ramanujan graphs and Hecke operators / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3999365 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correspondances modulaires et les fonctions \(\zeta\) de courbes algébriques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3710637 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536808 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5631239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash functions and Cayley graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4954415 / rank
 
Normal rank

Revision as of 17:02, 1 July 2024

scientific article
Language Label Description Also known as
English
Cryptographic hash functions from expander graphs
scientific article

    Statements

    Cryptographic hash functions from expander graphs (English)
    0 references
    0 references
    0 references
    0 references
    30 June 2009
    0 references
    cryptographic hash functions
    0 references
    expander graphs
    0 references
    elliptic curve cryptography
    0 references
    isogenies
    0 references
    Ramanujan graphs
    0 references
    supersingular elliptic curves
    0 references

    Identifiers