Security of cryptographic hash functions: Difference between revisions

Content deleted Content added
Snotbot (talk | contribs)
m Fixing improperly nested section headings (task 5)
More practical provably secure hash functions: Fix link to point to the math concept, not a book.
Line 67:
| contribution = Hard and easy Components of Collision Search in the Zémor-Tillich hash function:new Attacks and Reduced Variants with Equivalent Security
| contribution-url = http://www-rocq.inria.fr/secret/Jean-Pierre.Tillich/publications/CTRSA.pdf }}</ref>
* [[Hash functions from Sigma Protocols]] - there exists a general way of constructing a provably secure hash, specifically from a any (suitable) [[The Sigma ProtocolProof_of_knowledge#Sigma_protocols|sigma protocol]]. A faster version of [[Very smooth hash|VSH]] (called VSH*) could be obtained in this way.
 
==References==