Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The first 30 years of cryptographic hash functions and the NIST SHA-3 competition
B Preneel - Cryptographers' track at the RSA conference, 2010 - Springer
The first designs of cryptographic hash functions date back to the late 1970s; more
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …
Applications of finite non-Abelian simple groups to cryptography in the quantum era
The theory of finite simple groups is a (rather unexplored) area likely to provide interesting
computational problems and modeling tools useful in a cryptographic context. In this note …
computational problems and modeling tools useful in a cryptographic context. In this note …
Rubik's for cryptographers
Hard mathematical problems are at the core of security arguments in cryptography. In this
paper, we study mathematical generalizations of the famous Rubik's cube puzzle, namely …
paper, we study mathematical generalizations of the famous Rubik's cube puzzle, namely …
Navigating in the Cayley graph of and applications to hashing
Cayley hash functions are based on a simple idea of using a pair of (semi) group elements,
A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the …
A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string in the …
A Practical Cryptanalysis of WalnutDSA
D Hart, DH Kim, G Micheli, G Pascual-Perez… - … -Key Cryptography–PKC …, 2018 - Springer
We present a practical cryptanalysis of WalnutDSA, a digital signature algorithm
trademarked by SecureRF. WalnutDSA uses techniques from permutation groups, matrix …
trademarked by SecureRF. WalnutDSA uses techniques from permutation groups, matrix …
Preimages for the Tillich-Zémor hash function
After 15 years of unsuccessful cryptanalysis attempts by the research community, Grassl et
al. have recently broken the collision resistance property of the Tillich-Zémor hash function …
al. have recently broken the collision resistance property of the Tillich-Zémor hash function …
Left-Right Cayley Hashing: A New Framework for Provably Secure Hash Functions
Cayley hash function is a significant cryptographic primitive known to be provably secure
and expected to be universal due to the expansion property of Cayley graphs on finite …
and expected to be universal due to the expansion property of Cayley graphs on finite …
homomorphic hash functions: worst case to average case reduction and short collision search
C Mullan, B Tsaban - Designs, Codes and Cryptography, 2016 - Springer
We study homomorphic hash functions into SL _2 (q) SL 2 (q), the 2 * 2 2× 2 matrices with
determinant 1 over the field with q elements. Modulo a well supported number theoretic …
determinant 1 over the field with q elements. Modulo a well supported number theoretic …
[PDF][PDF] Ramanujan graphs for post-quantum cryptography
H Jo, S Sugiyama, Y Yamasaki - International Symposium on …, 2021 - library.oapen.org
We introduce a cryptographic hash function based on expander graphs, suggested by
Charles et al.'09, as one prominent candidate in post-quantum cryptography. We propose a …
Charles et al.'09, as one prominent candidate in post-quantum cryptography. We propose a …
[PDF][PDF] Length-hiding redactable signatures from one-way accumulators in O (n)
In this paper, we propose two provably secure and lengthhiding redactable signature
schemes. Both have a runtime complexity of O (n). This is lower than existing schemes …
schemes. Both have a runtime complexity of O (n). This is lower than existing schemes …