Cryptanalysis of a Cayley hash function based on affine maps in one variable over a finite field
From MaRDI portal
Publication:6564022
Recommendations
- Classical proofs for the quantum collapsing property of classical hash functions
- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
- Cryptanalysis of hash functions on the MD4-family.
- Vulnerability of cryptographic primitives based on the power conjugacy search problem in quantum computing
- SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks
Cites work
- scientific article; zbMATH DE number 177615 (Why is no real title available?)
- scientific article; zbMATH DE number 1406765 (Why is no real title available?)
- scientific article; zbMATH DE number 1456817 (Why is no real title available?)
- Compositions of linear functions and applications to hashing
- Cryptanalysis of a hash function, and the modular subset sum problem
- Cryptanalysis of the Tillich-Zémor hash function
- Cryptographic hash functions from expander graphs
- Cryptographic hash functions from sequences of lifted Paley graphs
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- Introduction to post-quantum cryptography
- More secure version of a Cayley hash function
- Navigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashing
- New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\)
- ON THE UNDECIDABILITY OF FREENESS OF MATRIX SEMIGROUPS
- Preimages for the Tillich-Zémor hash function
- Rubik’s for Cryptographers
This page was built for publication: Cryptanalysis of a Cayley hash function based on affine maps in one variable over a finite field
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6564022)