On the Security of the Hashing Scheme Based on SL 2
From MaRDI portal
Publication:4639443
DOI10.1007/3-540-69710-1_7zbMath1385.94002OpenAlexW2165769538MaRDI QIDQ4639443
No author found.
Publication date: 9 May 2018
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-69710-1_7
Related Items (8)
\(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search ⋮ Cryptanalysis of the Tillich-Zémor hash function ⋮ Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\) ⋮ New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\) ⋮ Collisions for the LPS Expander Graph Hash Function ⋮ Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security ⋮ Preimages for the Tillich-Zémor Hash Function ⋮ Cryptographic hash functions from expander graphs
Cites Work
This page was built for publication: On the Security of the Hashing Scheme Based on SL 2