Cryptanalysis of the Tillich-Zémor hash function
From MaRDI portal
Publication:2429714
DOI10.1007/s00145-010-9063-0zbMath1209.94040OpenAlexW1984484752MaRDI QIDQ2429714
Spyros S. Magliveras, Markus Grassl, Ivana Ilić, Rainer Steinwandt
Publication date: 1 April 2011
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-010-9063-0
Related Items
Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing, \(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search, Compositions of linear functions and applications to hashing, Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\), Interpreting Hash Function Security Proofs, New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\), Cryptographic Hash Functions and Expander Graphs: The End of the Story?, Ramanujan Graphs for Post-Quantum Cryptography, Cryptanalysis of a hash function, and the modular subset sum problem
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Continued fraction expansions of rational expressions with irreducible denominators in characteristic 2
- Hash functions and Cayley graphs
- The Magma algebra system. I: The user language
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- Attacking the SL 2 hashing scheme
- A note on the hash function of Tillich and Zémor
- On the Security of the Hashing Scheme Based on SL 2