Cryptographic hash functions and expander graphs: The end of the story?

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cayley hash functions are a family of cryptographic hash functions constructed from the Cayley graphs of non-Abelian finite groups. Their security relies on the hardness of mathematical problems related to long-standing conjectures in graph and group theory. We recall the Cayley hash design and known results on the underlying problems. We then describe related open problems, including the cryptanalysis of relevant parameters as well as new applications to cryptography and outside, assuming either that the problem is “hard” or easy.

Cite

CITATION STYLE

APA

Petit, C., & Quisquater, J. J. (2016). Cryptographic hash functions and expander graphs: The end of the story? In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9100, pp. 304–311). Springer Verlag. https://doi.org/10.1007/978-3-662-49301-4_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free