Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
VSH, an Efficient and Provable Collision-Resistant Hash Function - MaRDI portal

VSH, an Efficient and Provable Collision-Resistant Hash Function

From MaRDI portal
Publication:3593095

DOI10.1007/11761679_11zbMath1140.94331OpenAlexW1583471030MaRDI QIDQ3593095

Arjen K. Lenstra, Ron Steinfeld, Scott Contini

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_11




Related Items (27)

An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problemNavigating in the Cayley graph of \(\mathrm{SL}_2(\mathbb F_p)\) and applications to hashingWhirlwind: a new cryptographic hash functionCompositions of linear functions and applications to hashingBad Directions in Cryptographic Hash FunctionsObfuscated fuzzy Hamming distance and conjunctions from subset product problemsCryptanalysis of GrindahlAn Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured ChannelsDakota – Hashing from a Combination of Modular Arithmetic and Symmetric CryptographyEfficient reductions and algorithms for subset productCollision attack on \({\mathtt Grindahl}\)Robust digital signature revisitedAnalysis of Multivariate Hash FunctionsHow to Build a Hash Function from Any Collision-Resistant FunctionA characterization of chameleon hash functions and new, efficient designsInterpreting Hash Function Security ProofsVSH, an Efficient and Provable Collision-Resistant Hash FunctionProvably convertible multi-authenticated encryption scheme for generalized group communicationsVerifiable Multi-secret Sharing Schemes for Multiple Threshold Access StructuresHash Functions from Sigma Protocols and Improvements to VSHStatistical distribution and collisions of VSHLinearization Attacks Against Syndrome Based HashesOn a family of preimage-resistant functionsVSH and multiplicative modular relations between small primes with polynomial exponentsBuilding Secure Block Ciphers on Generic Attacks AssumptionsCryptographic hash functions from expander graphsSelf-certified multi-proxy signature schemes with message recovery



Cites Work


This page was built for publication: VSH, an Efficient and Provable Collision-Resistant Hash Function