FFT-hash II, efficient cryptographic hashing

11Citations
Citations of this article
37Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We propose an efficient algorithm that hashes messages of arbitrary bit length into an 128 bit hash value. The algorithm is designed to make the production of a pair of colliding messages computationally infeasible. The algorithm performs a discrete Fourier transform and a polynomial recursion over a finite field. Each hash value in {0, 1}128 occurs with frequency at most 2−120. This hash function is an improved variant of the algorithm FFT-hash I presented in the rump session of CRYPTO’91.

Cite

CITATION STYLE

APA

Schnorr, C. P. (1993). FFT-hash II, efficient cryptographic hashing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 658 LNCS, pp. 45–54). Springer Verlag. https://doi.org/10.1007/3-540-47555-9_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free