A note on the hash function of Tillich and Zémor
From MaRDI portal
Publication:4593783
DOI10.1007/3-540-60865-6_42zbMATH Open1373.94915OpenAlexW2917891478MaRDI QIDQ4593783FDOQ4593783
Authors: Willi Geiselmann
Publication date: 15 November 2017
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-60865-6_42
Recommendations
Cited In (13)
- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
- A class of hash functions based on the Algebraic Eraser\(^{\text{TM}}\)
- New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\)
- Title not available (Why is that?)
- \(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search
- Cryptanalysis of the Tillich-Zémor hash function
- Collisions for the LPS Expander Graph Hash Function
- On the security of the hashing scheme based on \(\mathrm{SL}_2\)
- A note on the hash function of Tillich and Zémor
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\)
- Preimages for the Tillich-Zémor hash function
- Authentication of sequences with the SL2 hash function: application to video sequences
This page was built for publication: A note on the hash function of Tillich and Zémor
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4593783)