Polynomial decomposition algorithms
Journal of Symbolic Computation
Functional decomposition ofpolynomials: the tame case
Journal of Symbolic Computation - Special issue on computational algebraic complexity
Functional decomposition of polynomials: The wild case
Journal of Symbolic Computation
Hash functions and Cayley graphs
Designs, Codes and Cryptography
Authentication of sequences with the SL2 hash function: application to video sequences
Journal of Computer Security - Special issue on security in the World Wide Web
Polynomial Decomposition Algorithm of Almost Quadratic Complexity
AAECC-6 Proceedings of the 6th International Conference, on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A Design Principle for Hash Functions
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Attacking the SL2 Hashing Scheme
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Design Principles for Dedicated Hash Functions
Fast Software Encryption, Cambridge Security Workshop
A Note on the Hash Function of Tillich and Zémor
Proceedings of the 5th IMA Conference on Cryptography and Coding
A new paradigm for collision-free hashing: incrementality at reduced cost
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Hash functions and graphs with large girths
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Loopholes in Two Public Key Cryptosystems Using the Modular Group
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Preimages for the Tillich-Zémor hash function
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Hi-index | 0.00 |
We show that for various choices of the parameters in the SL2(IF2n) hashing scheme, suggested by Tillich and ZÉmor, messages can be modified without changing the hash value. Moreover, examples of hash functions "with a trapdoor" within this family are given. Due to these weaknesses one should impose at least certain restrictions on the allowed parameter values when using the SL2(IF2n) hashing scheme for cryptographic purposes.