Funder
Professional Staff Congress and City University of New York
Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. Bernstein, D.J.: In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Introduction to post-quantum cryptography., pp. 1–14. Springer, Berlin (2009). https://doi.org/10.1007/978-3-540-88702-7_1
2. Petit, C., Lauter, K.E., Quisquater, J.: Cayley hashes: A class of efficient graph-based hash functions class of efficient graph-based hash functions (2007). https://christophe.petit.web.ulb.be/files/Cayley.pdf
3. Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93–113 (2009). https://doi.org/10.1007/s00145-007-9002-x
4. Jo, H., Yamasaki, Y.: LPS-type Ramanujan graphs. In: 2018 International Symposium on Information Theory and Its Applications (ISITA), pp. 399–403 (2018). https://doi.org/10.23919/ISITA.2018.8664284
5. Zémor, G.: Hash functions and graphs with large girths. In: Davies, D.W. (ed.) Advances in Cryptology—Eurocrypt’91, pp. 508–511. Springer, Berlin (1991). https://doi.org/10.1007/3-540-46416-6_44
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献