dc.contributor.author | Estuningsih, Rachmawati Dwi | |
dc.contributor.author | Guritman, Sugi | |
dc.contributor.author | Silalahi, Bib P. | |
dc.date.accessioned | 2016-06-30T03:36:08Z | |
dc.date.available | 2016-06-30T03:36:08Z | |
dc.date.issued | 2014 | |
dc.identifier.uri | http://repository.ipb.ac.id/handle/123456789/81104 | |
dc.description.abstract | Hash function based on lattices believed to have a strong security proof based on the worst-case hardness, In 2008. Lyubashevsky et al. proposed WSIFFT, aa hash function that corresponds to a simple expresion over modular polynomial ring R = Zp[alfa]/(alfa) n + 1). We construct HLI, a hash function that corresponds to a simple expression over modular polynomial ring Rf,p = Zp[x[/f(x). We choose a monic and irreducible polynomial f(x) = (x)n - x -1 to obtain the hash function is collision resistant. Thus, the number of operatins in hash function is collision resistant. Thus, the number of operations in hash function is calculated and compared with SWIFFT. Thus, the number of operations in hash function is calculated and compared with SWIFFT. | id |
dc.language.iso | en | id |
dc.publisher | Pushpa Publishing House, Allahabad, India | id |
dc.relation.ispartofseries | Volume 86, Number 1;Pages 23-36 | |
dc.title | Algorithm construction of HLI hash function | id |
dc.type | Article | id |