Example: dental hygienist

Cryptographic hash functions from expander graphs

Cryptographic hash functions from expander graphs Denis X. Charles 1, Eyal Z. Goren2, and Kristin E. Lauter ... We are concerned in this paper with unkeyed hash functions which are collision resistant. Unkeyed hash functions do not require a secret key to ... bits. We propose to use a graph of

Tags:

  Form, Paper, Functions, Bits, Graph, Expanders, Cryptographic, Hash, Cryptographic hash functions from expander

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Cryptographic hash functions from expander graphs

Related search queries