Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/81104
Title: Algorithm construction of HLI hash function
Authors: Estuningsih, Rachmawati Dwi
Guritman, Sugi
Silalahi, Bib P.
Issue Date: 2014
Publisher: Pushpa Publishing House, Allahabad, India
Series/Report no.: Volume 86, Number 1;Pages 23-36
Abstract: Hash function based on lattices believed to have a strong security proof based on the worst-case hardness, In 2008. Lyubashevsky et al. proposed WSIFFT, aa hash function that corresponds to a simple expresion over modular polynomial ring R = Zp[alfa]/(alfa) n + 1). We construct HLI, a hash function that corresponds to a simple expression over modular polynomial ring Rf,p = Zp[x[/f(x). We choose a monic and irreducible polynomial f(x) = (x)n - x -1 to obtain the hash function is collision resistant. Thus, the number of operatins in hash function is collision resistant. Thus, the number of operations in hash function is calculated and compared with SWIFFT. Thus, the number of operations in hash function is calculated and compared with SWIFFT.
URI: http://repository.ipb.ac.id/handle/123456789/81104
Appears in Collections:Faculty of Mathematics and Natural Sciences

Files in This Item:
File SizeFormat 
14-FJMS-08601-023.pdf95.47 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.