Example: quiz answers
Search results with tag "Cryptographic hash functions from expander"
Cryptographic hash functions from expander graphs
eprint.iacr.orgCryptographic hash functions from expander graphs Denis X. Charles 1, Eyal Z. Goren2, and Kristin E. Lauter ... We are concerned in this paper with unkeyed hash functions which are collision resistant. Unkeyed hash functions do not require a secret key to ... bits. We propose to use a graph of