Preimages for the Tillich-Zémor hash function
From MaRDI portal
Publication:3084262
Recommendations
- Cryptanalysis of the Tillich-Zémor hash function
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- A note on the hash function of Tillich and Zémor
- A note on the hash function of Tillich and Zémor
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
Cites work
- scientific article; zbMATH DE number 177615 (Why is no real title available?)
- scientific article; zbMATH DE number 1759785 (Why is no real title available?)
- scientific article; zbMATH DE number 1406765 (Why is no real title available?)
- scientific article; zbMATH DE number 1456817 (Why is no real title available?)
- A note on the hash function of Tillich and Zémor
- Attacking the SL 2 hashing scheme
- Collisions for the LPS Expander Graph Hash Function
- Continued fraction expansions of rational expressions with irreducible denominators in characteristic 2
- Cryptographic hash functions from expander graphs
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- Growth and generation in \(\text{SL}_2(\mathbb{Z}/p\mathbb{Z})\).
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- Hash functions and Cayley graphs
- On the security of the hashing scheme based on \(\mathrm{SL}_2\)
Cited in
(13)- Cryptanalysis of the Tillich-Zémor hash function
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\)
- Ramanujan graphs for post-quantum cryptography
- Preimage Attack on the Parallel FFT-Hashing Function
- Cryptographic hash functions and expander graphs: the end of the story?
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- Applications of finite non-abelian simple groups to cryptography in the quantum era
- Cryptanalysis of a Cayley hash function based on affine maps in one variable over a finite field
- Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)
- Compositions of linear functions and applications to hashing
- On a family of preimage-resistant functions
This page was built for publication: Preimages for the Tillich-Zémor hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3084262)