Now showing items 1-1 of 1

    • Construction of family of hash functions based on ideal lattice 

      Guritman, Sugi | Aliatiningtyas, Nur | Wulandari, Teduh | Ilyas, Muhammad (2015)
      Cryptographic hash function is a function h : D -> R with | D | >> | R | which has the security properties: one-way (computationally not feasible to calculate x e D from known y e R so that y = h(x)) and collision resistant ...