Cryptographic hash functions and expander graphs: the end of the story?
From MaRDI portal
Publication:2803636
Recommendations
Cites work
- scientific article; zbMATH DE number 4057439 (Why is no real title available?)
- scientific article; zbMATH DE number 177615 (Why is no real title available?)
- scientific article; zbMATH DE number 1759785 (Why is no real title available?)
- scientific article; zbMATH DE number 1917729 (Why is no real title available?)
- scientific article; zbMATH DE number 1456817 (Why is no real title available?)
- Collisions for the LPS Expander Graph Hash Function
- Cryptanalysis of short RSA secret exponents
- Cryptanalysis of the Tillich-Zémor hash function
- Cryptographic hash functions from expander graphs
- Diameters of Cayley graphs of Chevalley groups
- Expander graphs and their applications
- Expander graphs in pure and applied mathematics
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- Group theory in cryptography
- Growth and generation in \(\text{SL}_2(\mathbb{Z}/p\mathbb{Z})\).
- Growth in finite simple groups of Lie type
- Linear approximate groups.
- Navigating in the Cayley graphs of \(\text{SL}_N(\mathbb{Z})\) and \(\text{SL}_N(\mathbb{F}_p)\).
- Near-independence of permutations and an almost sure polynomial bound on the diameter of the symmetric group
- On the diameter of permutation groups
- On the diameter of permutation groups.
- Poly-log diameter bounds for some families of finite groups
- Preimages for the Tillich-Zémor hash function
- Ramanujan graphs
- Random Cayley graphs are expanders: a simple proof of the Alon-Roichman theorem
- Rubik’s for Cryptographers
- Small-diameter Cayley graphs for finite simple groups
- Some large trivalent graphs having small diameters
- The complexity of finding minimum-length generator sequences
- The minimum-length generator sequence problem is NP-hard
- Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)
- Uniform expansion bounds for Cayley graphs of \(\text{SL}_2(\mathbb F_p)\).
Cited in
(5)- Recent developments in Cayley hash functions
- New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\)
- Cryptographic hash functions from expander graphs
- Applications of finite non-abelian simple groups to cryptography in the quantum era
- Security aspects of the Cayley hash function using discrete Heisenberg group
This page was built for publication: Cryptographic hash functions and expander graphs: the end of the story?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803636)