2018
DOI: 10.1515/gcc-2018-0002
|View full text |Cite
|
Sign up to set email alerts
|

More secure version of a Cayley hash function

Abstract: In this paper, we propose a more secure version of a Cayley hash function which is based on the linear functions. It is a practical parallelizable hash function.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…This paper proves that the hash function proposed by Gaffari and Mustaghim [6] is not collision-resistant, which uses the hash proposed by Shpilrain and Sosnovski [16] that has been proven insecure by Monico [10]. To show that Gaffari and Mustaghim's is also insecure, we apply Monico's algorithm to find second-preimages for the Shpilrain-Sosnovski hash function to produce collisions for the Gaffari and Mustaghim's hash function.…”
Section: Introductionmentioning
confidence: 81%
See 1 more Smart Citation
“…This paper proves that the hash function proposed by Gaffari and Mustaghim [6] is not collision-resistant, which uses the hash proposed by Shpilrain and Sosnovski [16] that has been proven insecure by Monico [10]. To show that Gaffari and Mustaghim's is also insecure, we apply Monico's algorithm to find second-preimages for the Shpilrain-Sosnovski hash function to produce collisions for the Gaffari and Mustaghim's hash function.…”
Section: Introductionmentioning
confidence: 81%
“…To make the factorization problem harder, Ghaffari and Mostaghim [6] suggested the following variation. Let G the group generated by f 0 and f 1 over Z p , t > 1 an integer and g ∈ G \ {e, f 0 , f 1 }, where e is the identity element of G.…”
Section: Cayley Hash Functionsmentioning
confidence: 99%