Compositions of linear functions and applications to hashing
From MaRDI portal
Publication:338839
DOI10.1515/GCC-2016-0016zbMath1353.94073OpenAlexW2401675050MaRDI QIDQ338839
Vladimir Shpilrain, Bianca Sosnovski
Publication date: 7 November 2016
Published in: Groups, Complexity, Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/gcc-2016-0016
Free semigroups, generators and relations, word problems (20M05) Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Related Items (2)
More secure version of a Cayley hash function ⋮ Cryptanalysis of a hash function, and the modular subset sum problem
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- \(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- Cryptanalysis of the Tillich-Zémor hash function
- Preimages for the Tillich-Zémor Hash Function
- Rubik’s for Cryptographers
- VSH, an Efficient and Provable Collision-Resistant Hash Function
- An application of extrapolation to the limit
- ON THE UNDECIDABILITY OF FREENESS OF MATRIX SEMIGROUPS
This page was built for publication: Compositions of linear functions and applications to hashing