Cryptographic hash functions from expander graphs
From MaRDI portal
Recommendations
- Keyed hash function from large girth expander graphs
- Cryptographic hash functions and expander graphs: the end of the story?
- Hash functions and Cayley graphs
- Cryptographic properties of the quantum hashing based on expander graphs
- Cryptographic hash functions from sequences of lifted Paley graphs
- scientific article; zbMATH DE number 177615
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Generation of Expander Graphs Using Cellular Automata and Its Applications to Cryptography
- Cryptographic hash functions: theory and practice
Cites work
- scientific article; zbMATH DE number 1583782 (Why is no real title available?)
- scientific article; zbMATH DE number 3937328 (Why is no real title available?)
- scientific article; zbMATH DE number 4010603 (Why is no real title available?)
- scientific article; zbMATH DE number 48345 (Why is no real title available?)
- scientific article; zbMATH DE number 1349933 (Why is no real title available?)
- scientific article; zbMATH DE number 1759785 (Why is no real title available?)
- scientific article; zbMATH DE number 1456817 (Why is no real title available?)
- scientific article; zbMATH DE number 3356934 (Why is no real title available?)
- A Rigorous Subexponential Algorithm For Computation of Class Groups
- An algorithm for computing modular forms on \(\Gamma_0(N)\)
- Attacking the SL 2 hashing scheme
- Computing Modular Polynomials
- Constructing Isogenies between Elliptic Curves Over Finite Fields
- Correspondances modulaires et les fonctions \(\zeta\) de courbes algébriques
- Discrete logarithm variants of VSH
- Eigenvalues and expanders
- Fast algorithms for computing isogenies between elliptic curves
- Hash functions and Cayley graphs
- On the security of the hashing scheme based on \(\mathrm{SL}_2\)
- Quaternäre quadratische Formen und die Riemannsche Vermutung für die Kongruenzzetafunktion
- Ramanujan graphs
- Ramanujan graphs and Hecke operators
- Supersingular elliptic curves and maximal quaternionic orders
- VSH, an Efficient and Provable Collision-Resistant Hash Function
Cited in
(only showing first 100 items - show all)- On isogeny graphs of supersingular elliptic curves over finite fields
- On the hardness of the computational ring-LWR problem and its applications
- Cryptographic hash functions from sequences of lifted Paley graphs
- Modular polynomials on Hilbert surfaces
- Super-expanders and warped cones
- Explicit connections between supersingular isogeny graphs and Bruhat-Tits trees
- On division polynomial PIT and supersingularity
- Keyed hash function from large girth expander graphs
- Common composites of triangular polynomial systems and hash functions
- Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
- Quantum security analysis of CSIDH
- On 1-factorizations of bipartite Kneser graphs
- Cycles in the Supersingular ℓ-Isogeny Graph and Corresponding Endomorphisms
- A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE
- Constructing cycles in isogeny graphs of supersingular elliptic curves
- Pseudorandom numbers and hash functions from iterations of multivariate polynomials
- Improved supersingularity testing of elliptic curves using Legendre form
- CSIDH: an efficient post-quantum commutative group action
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Computing isogeny volcanoes of composite degree
- On the Security of Supersingular Isogeny Cryptosystems
- The supersingular isogeny problem in genus 2 and beyond
- A Probabilistic Study on Combinatorial Expanders and Hashing
- Hash functions from superspecial genus-2 curves using Richelot isogenies
- Preimages for the Tillich-Zémor hash function
- A trade-off between classical and quantum circuit size for an attack against CSIDH
- Algebraic approaches for solving isogeny problems of prime power degrees
- New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\)
- Towards isogeny-based password-authenticated key establishment
- A Survey on some Applications of Graph Theory in Cryptography
- Hash Functions from Sigma Protocols and Improvements to VSH
- Rational isogenies from irrational endomorphisms
- A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
- Isogenies on twisted Hessian curves
- Identification protocols and signature schemes based on supersingular isogeny problems
- Orienting supersingular isogeny graphs
- Cryptanalysis of an oblivious PRF from supersingular isogenies
- From graphs to keyed quantum hash functions
- Some graph-based encryption schemes
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- New techniques for SIDH-based NIKE
- Hash functions and Cayley graphs
- Constructing an efficient hash function from \(3\)-isogenies
- Counting Richelot isogenies between superspecial abelian surfaces
- \(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search
- Ramanujan graphs in cryptography
- Cryptographic hash functions and expander graphs: the end of the story?
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Collisions for the LPS Expander Graph Hash Function
- On the supersingular GPST attack
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Supersingular isogeny-based cryptography: a survey
- Efficient post-quantum undeniable signature on 64-bit ARM
- Generalized group-subgroup pair graphs
- How not to create an isogeny-based PAKE
- A characterization of chameleon hash functions and new, efficient designs
- scientific article; zbMATH DE number 177615 (Why is no real title available?)
- Computational problems in supersingular elliptic curve isogenies
- On the cost of computing isogenies between supersingular elliptic curves
- Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)
- Geometry and Combinatorics via Right-Angled Artin Groups
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
- Better path-finding algorithms in LPS Ramanujan graphs
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves
- Explicit isogenies in quadratic time in any characteristic
- On the quaternion \(\ell\)-isogeny path problem
- Multiradical isogenies
- A post-quantum round-optimal oblivious PRF from isogenies
- New constructions of collapsing hashes
- Endomorphism rings of supersingular elliptic curves over \(\mathbb{F}_p\)
- Interpreting hash function security proofs
- Séta: Supersingular Encryption from Torsion Attacks
- Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
- Orientations and the supersingular endomorphism ring problem
- Expanders and right-angled Artin groups
- Oblivious pseudorandom functions from isogenies
- Automorphisms of the supersingular isogeny graph
- Efficient computation of \((3^n,3^n)\)-isogenies
- How to construct quantum FHE, generically
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
- Proving knowledge of isogenies: a survey
- Full quantum equivalence of group action DLog and CDH, and more
- Orienteering with one endomorphism
- SimS: a simplification of SiGamal
- Practical robust DKG protocols for CSIDH
- Efficient computation of \((2^n, 2^n)\)-isogenies
- Compact identity-based signature and puncturable signature from SQISign
- Exploring SIDH-based signature parameters
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- On the isogeny problem with torsion point information
- Loops, multi-edges and collisions in supersingular isogeny graphs
- Encryption and decryption using decomposition of complete graph \(K_{3(6n+1)}\)
- Spectrum of random d‐regular graphs up to the edge
- Isogeny graphs on superspecial abelian varieties: eigenvalues and connection to Bruhat-Tits buildings
- Ramanujan graphs for post-quantum cryptography
- DeCSIDH: delegating isogeny computations in the CSIDH setting
- Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence
- New SIDH countermeasures for a more efficient key exchange
- Cryptographic group actions and applications
This page was built for publication: Cryptographic hash functions from expander graphs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1027970)