Now showing items 1-4 of 4

    • Algorithm construction of HLI hash function 

      Estuningsih, Rachmawati Dwi | Guritman, Sugi | Silalahi, Bib P. (2014)
      Hash function based on lattices believed to have a strong security proof based on the worst-case hardness, In 2008. Lyubashevsky et al. proposed WSIFFT, aa hash function that corresponds to a simple expresion over modular ...
    • Construction of family of hash functions based on ideal lattice 

      Guritman, Sugi | Aliatiningtyas, Nur | Wulandari, Teduh | Ilyas, Muhammad (2015)
      Cryptographic hash function is a function h : D -> R with | D | >> | R | which has the security properties: one-way (computationally not feasible to calculate x e D from known y e R so that y = h(x)) and collision resistant ...
    • Restrictions on the weight distribution of quaternary linear codes 

      Guritman, Sugi | Simonis, Juriaan (2002)
      This paper describes some nonexistence results for quaternary linear codes. The standard linear program is strengthened with constraints from the weight distribution of binary Reed-Muller codes.
    • The construction of greedy SVP LLL algorithm 

      Khair, Saiful | Guritman, Sugi | Silalahi, Bib P. (2013)
      LLL algorithm is an algorithm used to compute the approximation of the shortest nonzero vector in a basis of lattice. Terms of reduction size and the exchanging process are the important steps in the LLL algorithm. In 1994, ...