Compositions of linear functions and applications to hashing
DOI10.1515/GCC-2016-0016zbMATH Open1353.94073OpenAlexW2401675050MaRDI QIDQ338839FDOQ338839
Vladimir Shpilrain, Bianca Sosnovski
Publication date: 7 November 2016
Published in: Groups - Complexity - Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/gcc-2016-0016
Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Free semigroups, generators and relations, word problems (20M05)
Cites Work
- ON THE UNDECIDABILITY OF FREENESS OF MATRIX SEMIGROUPS
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- Cryptanalysis of the Tillich-Zémor hash function
- \(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search
- Rubik’s for Cryptographers
- Preimages for the Tillich-Zémor Hash Function
- VSH, an Efficient and Provable Collision-Resistant Hash Function
- An application of extrapolation to the limit
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (6)
- Applications of finite non-abelian simple groups to cryptography in the quantum era
- Cryptanalysis of a Cayley hash function based on affine maps in one variable over a finite field
- More secure version of a Cayley hash function
- Linear hash functions
- Applications of hashing in algebraic manipulation (an annotated bibliography)
- Cryptanalysis of a hash function, and the modular subset sum problem
This page was built for publication: Compositions of linear functions and applications to hashing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q338839)