The first 30 years of cryptographic hash functions and the NIST SHA-3 competition

B Preneel - Cryptographers' track at the RSA conference, 2010 - Springer
The first designs of cryptographic hash functions date back to the late 1970s; more
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …

Applications of finite non-Abelian simple groups to cryptography in the quantum era

MIG Vasco, D Kahrobaei, E McKemmie - La Matematica, 2024 - Springer
The theory of finite simple groups is a (rather unexplored) area likely to provide interesting
computational problems and modeling tools useful in a cryptographic context. In this note …

Rubik's for cryptographers

C Petit, JJ Quisquater - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Hard mathematical problems are at the core of security arguments in cryptography. In this
paper, we study mathematical generalizations of the famous Rubik's cube puzzle, namely …

Navigating in the Cayley graph of and applications to hashing

L Bromberg, V Shpilrain, A Vdovina - Semigroup Forum, 2017 - Springer
Cayley hash functions are based on a simple idea of using a pair of (semi) group elements,
A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the …

A Practical Cryptanalysis of WalnutDSA

D Hart, DH Kim, G Micheli, G Pascual-Perez… - … -Key Cryptography–PKC …, 2018 - Springer
We present a practical cryptanalysis of WalnutDSA, a digital signature algorithm
trademarked by SecureRF. WalnutDSA uses techniques from permutation groups, matrix …

Preimages for the Tillich-Zémor hash function

C Petit, JJ Quisquater - Selected Areas in Cryptography: 17th International …, 2011 - Springer
After 15 years of unsuccessful cryptanalysis attempts by the research community, Grassl et
al. have recently broken the collision resistance property of the Tillich-Zémor hash function …

Left-Right Cayley Hashing: A New Framework for Provably Secure Hash Functions

Y Aikawa, H Jo, S Satake - Mathematical Cryptology, 2023 - journals.flvc.org
Cayley hash function is a significant cryptographic primitive known to be provably secure
and expected to be universal due to the expansion property of Cayley graphs on finite …

homomorphic hash functions: worst case to average case reduction and short collision search

C Mullan, B Tsaban - Designs, Codes and Cryptography, 2016 - Springer
We study homomorphic hash functions into SL _2 (q) SL 2 (q), the 2 * 2 2× 2 matrices with
determinant 1 over the field with q elements. Modulo a well supported number theoretic …

[PDF][PDF] Ramanujan graphs for post-quantum cryptography

H Jo, S Sugiyama, Y Yamasaki - International Symposium on …, 2021 - library.oapen.org
We introduce a cryptographic hash function based on expander graphs, suggested by
Charles et al.'09, as one prominent candidate in post-quantum cryptography. We propose a …

[PDF][PDF] Length-hiding redactable signatures from one-way accumulators in O (n)

HC Pöhls, K Samelin, J Posegga… - Faculty Comput. Sci …, 2012 - henrich.poehls.com
In this paper, we propose two provably secure and lengthhiding redactable signature
schemes. Both have a runtime complexity of O (n). This is lower than existing schemes …