Some applications of a theorem of Shirshov to language theory
Information and Control
Local and global cyclicity in free semigroups
Theoretical Computer Science
Finiteness and Regularity in Semigroups and Formal Languages
Finiteness and Regularity in Semigroups and Formal Languages
Introduction to Formal Language Theory
Introduction to Formal Language Theory
Discrete Applied Mathematics
Birthday Paradox for Multi-Collisions
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
The Ehrenfeucht-Silberger Problem
ICALP '09 Proceedings of the 36th International Colloquium on Automata, Languages and Programming: Part I
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
Selected Areas in Cryptography
Constructing an ideal hash function from weak ideal compression functions
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Combinatorial multicollision attacks on generalized iterated hash functions
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Multicollision Attacks on Some Generalized Sequential Hash Functions
IEEE Transactions on Information Theory
Multicollisions and graph-based hash functions
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Hi-index | 0.00 |
Traditionally in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings over a fixed size alphabet. Inspired by permutation problems originating from information security, another viewpoint is taken in this paper. We focus on combinatorial properties of long words in which the number of occurrences of any symbol is restritced by a fixed given constant. More precisely, we show that for all positive integers m and q there exists the least positive integer N(m, q) which is smaller than m2q-1 and satifies the following: If a is a word such that (i) |alph(α)| ≥ N(m, q) (i.e., the cardinality of the alphabet of α is at least N(m, q)); and (ii) |α|a ≤ q for each a ∈ alph(α) (i.e., the number of occurrences of any symbol of alph(α) in α is at most q), then there exist a set A ⊆ alph(α) of cardinality |A| = m, an integer p ∈ {1, 2, . . . , q}, and permutations σ1, σ2, . . . , σp : {1, 2, . . . , m} → {1, 2, . . . , m} for which πA(α) ∈ aσ1(1)+...aσ1(m)+aσ2(1)+...aσ2(m)+...aσp(1)+...aσp(m)+. Here A = {a1, a2, . . . , am} and πA is the projection morphism from alph(α)* into A*. Finally, we demonstrate how problems such as the one above are connected to constructing multicollision attacks on so called generalized iterated hash functions.