Recent developments in Cayley hash functions
From MaRDI portal
Publication:1662293
Recommendations
- Cryptographic hash functions and expander graphs: the end of the story?
- Hash functions and Cayley graphs
- Cryptographic Hash Functions and Some Applications to Information Security
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- scientific article; zbMATH DE number 1456817
Cited in
(6)- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- Hash functions and Cayley graphs
- More secure version of a Cayley hash function
- Cryptographic hash functions and expander graphs: the end of the story?
- Compositions of linear functions and applications to hashing
- Security aspects of the Cayley hash function using discrete Heisenberg group
This page was built for publication: Recent developments in Cayley hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1662293)