{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:37Z","timestamp":1764996817106},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540583332"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_5","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"40-49","source":"Crossref","is-referenced-by-count":43,"title":["Hashing with SL 2"],"prefix":"10.1007","author":[{"given":"Jean-Pierre","family":"Tillich","sequence":"first","affiliation":[]},{"given":"Gilles","family":"Z\u00e9mor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1016\/S0195-6698(89)80067-8","volume":"10","author":"L. Babai","year":"1989","unstructured":"Babai, L., Kantor, W. M., Lubotsky, A: Small-diameter Cayley graphs for finite simple groups. Europ. J. of Combinatorics 10 (1989) 507\u2013522","journal-title":"Europ. J. of Combinatorics"},{"key":"5_CR2","unstructured":"Bosset, J: Contre les risques d\u2019alt\u00e9ration, un syst\u00e8me de certifications des informations. 01 Informatique (1977)"},{"key":"5_CR3","unstructured":"Camion, P: Can a fast signature scheme without secret key be secure? In proc. AAECC (1987) Springer-Verlag Lec. N. Comp. Sci. 228 pp. 187\u2013196"},{"key":"5_CR4","unstructured":"Dickson, L: Linear groups with an exposition of the Galois field theory. Dover New York 1958"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0304-3975(85)90047-7","volume":"36","author":"M. R. Jerrum","year":"1985","unstructured":"Jerrum, M. R: The complexity of finding minimum length generator sequences. Theoretical Computer Science 36 (1985) 265\u2013289","journal-title":"Theoretical Computer Science"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"J. Lafferty, Rockmore, D: Numerical investigation of the spectrum for certain families of cayley graphs. In 1992 DIMACS Workshop on expanders graphs (1993) D. S. in Disc. Math., T. C. S. in Discrete Mathematics, and T. C. Science, Eds. pp. 63\u201374","DOI":"10.1090\/dimacs\/010\/06"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/BF02579283","volume":"2","author":"G. A. Margulis","year":"1982","unstructured":"Margulis, G. A: Explicit constructions of graphs without short cycles and low density codes. COMBINATORICA 2 (1982) 71\u201378","journal-title":"COMBINATORICA"},{"key":"5_CR8","first-page":"51","volume":"24","author":"G. A. Margulis","year":"1988","unstructured":"Margulis, G. A: Explicit group-theoretical constructions of combinatorial schemes and their application to the design of expanders and concentrators. Problemy Peredachi Informatsii 24 (1988) 51\u201360","journal-title":"Problemy Peredachi Informatsii"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Sarnack, P: Some applications of modular forms. Cambridge University Press 1990","DOI":"10.1017\/CBO9780511895593"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Suzuki, M: Group theory, volume I. Springer-Verlag 1982","DOI":"10.1007\/978-3-642-61804-8"},{"key":"5_CR11","unstructured":"Tillich, J.-P., Z\u00e9mor, G: Group-theoretic hash functions. In First French-Israeli workshop on algebraic coding (1994) Springer-Verlag Lec. N. Comp. Sci. 781 pp. 90\u2013110"},{"key":"5_CR12","unstructured":"Z\u00e9mor, G: Hash functions and Cayley graphs. To appear in Designs, Codes and Cryptography"},{"key":"5_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1007\/3-540-46416-6_44","volume-title":"EUROCRYPT 91","author":"G. Z\u00e9mor","year":"1991","unstructured":"Z\u00e9mor, G: Hash functions and graphs with large girths. In EUROCRYPT 91 (1991) LNCS 547 Springer-Verlag pp. 508\u2013511"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:16:18Z","timestamp":1605647778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_5","relation":{},"subject":[]}}