Collisions for the LPS Expander Graph Hash Function
From MaRDI portal
Publication:5458596
DOI10.1007/978-3-540-78967-3_15zbMath1149.94330OpenAlexW1526708853MaRDI QIDQ5458596
Jean-Pierre Tillich, Gilles Zémor
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_15
Related Items
Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\) ⋮ Ramanujan Graphs in Cryptography ⋮ A characterization of chameleon hash functions and new, efficient designs ⋮ Keyed hash function from large girth expander graphs ⋮ Better path-finding algorithms in LPS Ramanujan graphs ⋮ Interpreting Hash Function Security Proofs ⋮ New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\) ⋮ Hash Functions from Sigma Protocols and Improvements to VSH ⋮ Cryptographic Hash Functions and Expander Graphs: The End of the Story? ⋮ Ramanujan Graphs for Post-Quantum Cryptography ⋮ Preimages for the Tillich-Zémor Hash Function ⋮ Constructing an efficient hash function from $3$-isogenies
Cites Work
- Cryptographic hash functions from expander graphs
- Ramanujan graphs
- Hash functions and Cayley graphs
- Expander graphs and their applications
- Authentication of sequences with the SL2 hash function: application to video sequences
- Attacking the SL 2 hashing scheme
- A note on the hash function of Tillich and zémor
- On the Security of the Hashing Scheme Based on SL 2
- Hashing with Polynomials
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item