scientific article
From MaRDI portal
Publication:4037494
zbMath0791.68055MaRDI QIDQ4037494
Publication date: 18 May 1993
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Graph theory (including graph drawing) in computer science (68R10) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Paths and cycles (05C38)
Related Items (11)
Security aspects of the Cayley hash function using discrete heisenberg group ⋮ \(\mathrm{SL}_2\) homomorphic hash functions: worst case to average case reduction and short collision search ⋮ Matrix PRFs: constructions, attacks, and applications to obfuscation ⋮ Cryptanalysis of the Tillich-Zémor hash function ⋮ Unnamed Item ⋮ Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\) ⋮ New Zémor-Tillich type hash functions over \(\mathrm{GL}_2 (\mathbb{F}_{p^n})\) ⋮ Ironwood meta key agreement and authentication protocol ⋮ Cryptographic Hash Functions and Expander Graphs: The End of the Story? ⋮ On 1-factorizations of bipartite Kneser graphs ⋮ Preimages for the Tillich-Zémor Hash Function
This page was built for publication: