A note on the hash function of Tillich and Zémor
From MaRDI portal
Publication:4593783
Recommendations
Cited in
(13)- Authentication of sequences with the SL2 hash function: application to video sequences
- Cryptanalysis of the Tillich-Zémor hash function
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- On the security of the hashing scheme based on \(\mathrm{SL}_2\)
- A class of hash functions based on the Algebraic Eraser\(^{\text{TM}}\)
- Preimages for the Tillich-Zémor hash function
- New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\)
- scientific article; zbMATH DE number 1759785 (Why is no real title available?)
- \(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- Collisions for the LPS Expander Graph Hash Function
- A note on the hash function of Tillich and Zémor
- Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)
This page was built for publication: A note on the hash function of Tillich and Zémor
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593783)