Preimages for the Tillich-Zémor hash function
From MaRDI portal
Publication:3084262
DOI10.1007/978-3-642-19574-7_20zbMATH Open1290.94119DBLPconf/sacrypt/PetitQ10OpenAlexW1669794847WikidataQ62047266 ScholiaQ62047266MaRDI QIDQ3084262FDOQ3084262
Authors: Jean-Jacques Quisquater, Christophe Petit
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_20
Recommendations
- Cryptanalysis of the Tillich-Zémor hash function
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- A note on the hash function of Tillich and Zémor
- A note on the hash function of Tillich and Zémor
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
Cites Work
- A note on the hash function of Tillich and Zémor
- Cryptographic hash functions from expander graphs
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- Title not available (Why is that?)
- On the security of the hashing scheme based on \(\mathrm{SL}_2\)
- Title not available (Why is that?)
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- Hash functions and Cayley graphs
- Growth and generation in \(\text{SL}_2(\mathbb{Z}/p\mathbb{Z})\).
- Title not available (Why is that?)
- Collisions for the LPS Expander Graph Hash Function
- Continued fraction expansions of rational expressions with irreducible denominators in characteristic 2
- Attacking the SL 2 hashing scheme
- Title not available (Why is that?)
Cited In (13)
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- Applications of finite non-abelian simple groups to cryptography in the quantum era
- Cryptanalysis of a Cayley hash function based on affine maps in one variable over a finite field
- On a family of preimage-resistant functions
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\)
- Ramanujan graphs for post-quantum cryptography
- Compositions of linear functions and applications to hashing
- Cryptanalysis of the Tillich-Zémor hash function
- Cryptographic hash functions and expander graphs: the end of the story?
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)
- Preimage Attack on the Parallel FFT-Hashing Function
This page was built for publication: Preimages for the Tillich-Zémor hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3084262)