Attacking the SL 2 hashing scheme
From MaRDI portal
Publication:4341802
DOI10.1007/BFb0000444zbMath1126.94323OpenAlexW1886344012MaRDI QIDQ4341802
Publication date: 18 June 1997
Published in: Advances in Cryptology — ASIACRYPT'94 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bfb0000444
Related Items (8)
Cryptanalysis of the Tillich-Zémor hash function ⋮ Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\) ⋮ On the Security of the Hashing Scheme Based on SL 2 ⋮ New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\) ⋮ Collisions for the LPS Expander Graph Hash Function ⋮ Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security ⋮ Preimages for the Tillich-Zémor Hash Function ⋮ Cryptographic hash functions from expander graphs
This page was built for publication: Attacking the SL 2 hashing scheme