Construction of family of hash functions based on ideal lattice
View/ Open
Date
2015Author
Guritman, Sugi
Aliatiningtyas, Nur
Wulandari, Teduh
Ilyas, Muhammad
Metadata
Show full item recordAbstract
Cryptographic hash function is a function h : D -> R with | D | >> | R | which has the security properties: one-way (computationally not feasible to calculate x e D from known y e R so that y = h(x)) and collision resistant (not feasible determining x =/ y so that h(x) = h(y)).