Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)
From MaRDI portal
Publication:2448084
DOI10.1007/s10623-012-9743-xzbMath1290.94118OpenAlexW2024557214WikidataQ62047256 ScholiaQ62047256MaRDI QIDQ2448084
Publication date: 29 April 2014
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-012-9743-x
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Software, source code, etc. for problems pertaining to group theory (20-04) Factorization (11Y05)
Related Items (2)
\(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search ⋮ Cryptographic Hash Functions and Expander Graphs: The End of the Story?
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Continued fraction expansions of rational expressions with irreducible denominators in characteristic 2
- Approximate subgroups of linear groups.
- Diameters of Cayley graphs of Chevalley groups
- Cryptographic hash functions from expander graphs
- Straight-line program length as a parameter for complexity analysis
- Factoring polynomials with rational coefficients
- On the diameter of permutation groups
- Some large trivalent graphs having small diameters
- Lattice reduction: a toolbox for the cryptoanalyst
- Discrete groups, expanding graphs and invariant measures. Appendix by Jonathan D. Rogawski
- Hash functions and Cayley graphs
- The probability of generating a finite simple group
- Growth and generation in \(\text{SL}_2(\mathbb{Z}/p\mathbb{Z})\).
- Cryptanalysis of the Tillich-Zémor hash function
- Growth in \(\mathrm{SL}_3(\mathbb Z/p\mathbb Z)\).
- Navigating in the Cayley graphs of \(\text{SL}_N(\mathbb{Z})\) and \(\text{SL}_N(\mathbb{F}_p)\).
- Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
- Preimages for the Tillich-Zémor Hash Function
- Rubik’s for Cryptographers
- Fast evaluation of logarithms in fields of characteristic two
- Growth in finite simple groups of Lie type
- Expander graphs and their applications
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- On the diameter of Eulerian orientations of graphs
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- A method for obtaining digital signatures and public-key cryptosystems
- Attacking the SL 2 hashing scheme
- A note on the hash function of Tillich and zémor
- On the Security of the Hashing Scheme Based on SL 2
- Continued fractions of Laurent series with partial quotients from a given set
- Collisions for the LPS Expander Graph Hash Function
- Lattice-Based Cryptography
This page was built for publication: Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)