Please use this identifier to cite or link to this item:
http://repository.ipb.ac.id/handle/123456789/81104Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Estuningsih, Rachmawati Dwi | - |
| dc.contributor.author | Guritman, Sugi | - |
| dc.contributor.author | Silalahi, Bib P. | - |
| dc.date.accessioned | 2016-06-30T03:36:08Z | - |
| dc.date.available | 2016-06-30T03:36:08Z | - |
| dc.date.issued | 2014 | - |
| dc.identifier.uri | http://repository.ipb.ac.id/handle/123456789/81104 | - |
| dc.description.abstract | Hash function based on lattices believed to have a strong security proof based on the worst-case hardness, In 2008. Lyubashevsky et al. proposed WSIFFT, aa hash function that corresponds to a simple expresion over modular polynomial ring R = Zp[alfa]/(alfa) n + 1). We construct HLI, a hash function that corresponds to a simple expression over modular polynomial ring Rf,p = Zp[x[/f(x). We choose a monic and irreducible polynomial f(x) = (x)n - x -1 to obtain the hash function is collision resistant. Thus, the number of operatins in hash function is collision resistant. Thus, the number of operations in hash function is calculated and compared with SWIFFT. Thus, the number of operations in hash function is calculated and compared with SWIFFT. | id |
| dc.language.iso | en | id |
| dc.publisher | Pushpa Publishing House, Allahabad, India | id |
| dc.relation.ispartofseries | Volume 86, Number 1;Pages 23-36 | - |
| dc.title | Algorithm construction of HLI hash function | id |
| dc.type | Article | id |
| Appears in Collections: | Faculty of Mathematics and Natural Sciences | |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| 14-FJMS-08601-023.pdf | 95.47 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.