Simple hash function using discrete-time quantum walks
From MaRDI portal
Publication:1993832
DOI10.1007/s11128-018-1954-2zbMath1448.81296OpenAlexW2809417478MaRDI QIDQ1993832
Yu-Guang Yang, Wei-Min Shi, Jing-Lin Bi, Zheng Yuan, Yi-Hua Zhou, Xiu-Bo Chen
Publication date: 5 November 2018
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-018-1954-2
Sums of independent random variables; random walks (60G50) (2)-body potential quantum scattering theory (81U05) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (6)
Controlled alternate quantum walk-based block hash function ⋮ Unitary coined discrete-time quantum walks on directed multigraphs ⋮ A quantum blockchain-enabled framework for secure private electronic medical records in Internet of medical things ⋮ Usefulness of decoherence in quantum-walk-based hash function ⋮ Hash function based on quantum walks ⋮ A quantum hash function with grouped coarse-grained boson sampling
Uses Software
Cites Work
- Beyond regular semigroups
- An algebraic method for quaternion and complex least squares coneigen-problem in quantum mechanics
- An existence and uniqueness theorem for a second order nonlinear system with coupled integral boundary value conditions
- Discrete-time interacting quantum walks and quantum hash schemes
- Analysis of the two-particle controlled interacting quantum walks
- A Bargmann system and the involutive solutions associated with a new 4-order lattice hierarchy
- Adaptive dynamics analysis of a predator-prey model with selective disturbance
- RIPEMD with two-round compress function is not collision-free
- Cryptanalysis of MD4
- A decomposition method for large-scale box constrained optimization
- Dynamical analysis of SIR epidemic model with nonlinear pulse vaccination and lifelong immunity
- Bifurcation Analysis of Five-Level Cascaded H-Bridge Inverter Using Proportional-Resonant Plus Time-Delayed Feedback
- Universal One-Way Hash Functions via Inaccessible Entropy
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Cryptanalysis of MD4
- GLOBAL ANALYSIS FOR A DELAYED SIV MODEL WITH DIRECT AND ENVIRONMENTAL TRANSMISSIONS
- GLOBAL DYNAMICS ANALYSIS OF A NONLINEAR IMPULSIVE STOCHASTIC CHEMOSTAT SYSTEM IN A POLLUTED ENVIRONMENT
- Directional correlations in quantum walks with two particles
- Quantum walks on graphs
- Advances in Cryptology - EUROCRYPT 2004
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Merkle-Damgård Revisited: How to Construct a Hash Function
- A Failure-Friendly Design Principle for Hash Functions
- A Meet-in-the-Middle Collision Attack Against the New FORK-256
- Theory of Cryptography
- One Way Hash Functions and DES
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Simple hash function using discrete-time quantum walks