Collisions for the LPS Expander Graph Hash Function
暂无分享,去创建一个
[1] P. Sarnak. Some Applications of Modular Forms , 1990 .
[2] Thomas Beth,et al. Weaknesses in the SL2(IF2n) hashing scheme , 2000 .
[3] Marc Joye,et al. Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences , 1997, J. Comput. Secur..
[4] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[5] Byoungcheon Lee,et al. Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings , 2006, ICISC.
[6] Kristin E. Lauter,et al. Cryptographic Hash Functions from Expander Graphs , 2008, Journal of Cryptology.
[7] H. A. Helfgott. Growth and generation in SL_2(Z/pZ) , 2005 .
[8] N. Linial,et al. Expander Graphs and their Applications , 2006 .
[9] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[10] Vladimir Shpilrain. Hashing with Polynomials , 2006, ICISC.
[11] Tsutomu Matsumoto,et al. Incidence structures for key sharing , 1995 .
[12] Gilles Zémor,et al. Hash Functions And Graphs With Large Girths , 1991, EUROCRYPT.
[13] Gilles Zémor,et al. Hashing with SL_2 , 1994, CRYPTO.
[14] Giuliana P. Davidoff,et al. Elementary number theory, group theory, and Ramanujan graphs , 2003 .
[15] M. Murty. Ramanujan Graphs , 1965 .
[16] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[17] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[18] Markus Grassl,et al. Weaknesses in the SL2(IFs2) Hashing Scheme , 2000, CRYPTO.
[19] Gilles Zémor. Hash functions and Cayley graphs , 1994, Des. Codes Cryptogr..
[20] Chris Charnes,et al. Attacking the SL2 Hashing Scheme , 1994, ASIACRYPT.
[21] Willi Geiselmann. A Note on the Hash Function of Tillich and Zémor , 1995, IMACC.
[22] Chul Kim,et al. On the Security of the Hashing Scheme Based on SL2 , 1998, FSE.
[23] H. Helfgott. Growth and generation in $\mathrm{SL}_2(\mathbb{Z}/p \mathbb{Z})$ , 2008 .
[24] Gilles Zémor,et al. Group-theoretic hash functions , 1993, Algebraic Coding.