Pages that link to "Item:Q3593095"
From MaRDI portal
The following pages link to VSH, an Efficient and Provable Collision-Resistant Hash Function (Q3593095):
Displayed 27 items.
- Compositions of linear functions and applications to hashing (Q338839) (← links)
- A characterization of chameleon hash functions and new, efficient designs (Q484332) (← links)
- Provably convertible multi-authenticated encryption scheme for generalized group communications (Q712686) (← links)
- VSH and multiplicative modular relations between small primes with polynomial exponents (Q742508) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- Cryptographic hash functions from expander graphs (Q1027970) (← links)
- Self-certified multi-proxy signature schemes with message recovery (Q1045611) (← links)
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems (Q2175905) (← links)
- Robust digital signature revisited (Q2205942) (← links)
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing (Q2362747) (← links)
- Whirlwind: a new cryptographic hash function (Q2638401) (← links)
- On a family of preimage-resistant functions (Q3075868) (← links)
- Bad Directions in Cryptographic Hash Functions (Q3194624) (← links)
- Cryptanalysis of Grindahl (Q3498399) (← links)
- An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels (Q3503868) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- VSH, an Efficient and Provable Collision-Resistant Hash Function (Q3593095) (← links)
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures (Q3600329) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- Building Secure Block Ciphers on Generic Attacks Assumptions (Q3644193) (← links)
- Interpreting Hash Function Security Proofs (Q4933215) (← links)
- An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem (Q5034573) (← links)
- Analysis of Multivariate Hash Functions (Q5385529) (← links)
- How to Build a Hash Function from Any Collision-Resistant Function (Q5387097) (← links)
- Statistical distribution and collisions of VSH (Q5443566) (← links)
- Linearization Attacks Against Syndrome Based Hashes (Q5458196) (← links)
- Efficient reductions and algorithms for subset product (Q6132518) (← links)