Recent Developments in Cayley Hash Functions

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In 1994, Tillich and Zémor proposed a scheme for a family of hash functions. In the scheme, they used products of 2 × 2 matrices in special linear group over a field. Since then, other hash functions based on the Tillich and Zémor’s design have been proposed. These cryptographic hash functions are called Cayley hash functions because of the correspondence between their constructions and Cayley graphs of (semi)groups. Most instances of Cayley hash functions have been proved insecure, but the algorithms used to break Cayley hash functions target specific vulnerabilities of each underlying (semi)group used. However, these algorithms don’t seem to invalidate the generic scheme. An overview is presented of some of the latest proposals for Cayley hash functions and related open problems.

Cite

CITATION STYLE

APA

Sosnovski, B. (2018). Recent Developments in Cayley Hash Functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10931 LNCS, pp. 438–447). Springer Verlag. https://doi.org/10.1007/978-3-319-96418-8_52

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free