Example: quiz answers

Search results with tag "Cryptographic hash functions from expander"

Cryptographic hash functions from expander graphs

Cryptographic hash functions from expander graphs

eprint.iacr.org

Cryptographic hash functions from expander graphs Denis X. Charles 1, Eyal Z. Goren2, and Kristin E. Lauter ... We are concerned in this paper with unkeyed hash functions which are collision resistant. Unkeyed hash functions do not require a secret key to ... bits. We propose to use a graph of

  Form, Paper, Functions, Bits, Graph, Expanders, Cryptographic, Hash, Cryptographic hash functions from expander

Similar queries