{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:38Z","timestamp":1740099098416,"version":"3.37.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319964171"},{"type":"electronic","value":"9783319964188"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-96418-8_52","type":"book-chapter","created":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T06:57:13Z","timestamp":1531465033000},"page":"438-447","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Recent Developments in Cayley Hash\u00a0Functions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4725-8653","authenticated-orcid":false,"given":"Bianca","family":"Sosnovski","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,14]]},"reference":[{"key":"52_CR1","unstructured":"Anshel, I., Atkins, D., Goldfeld, D., Gunnells, P.E.: Post quantum group theoretic cryptography. Tech. Rep., SecureRF Corporation, Shelton, CT, USA (2016)"},{"issue":"4","key":"52_CR2","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1016\/S0195-6698(05)80029-0","volume":"13","author":"L Babai","year":"1992","unstructured":"Babai, L., Seress, \u00c1.: On the diameter of permutation groups. Eur. J. Comb. 13(4), 231\u2013243 (1992). \nhttps:\/\/doi.org\/10.1016\/S0195-6698(05)80029-0","journal-title":"Eur. J. Comb."},{"issue":"3","key":"52_CR3","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s00200-006-0003-z","volume":"17","author":"G Baumslag","year":"2006","unstructured":"Baumslag, G., Fine, B., Xu, X.: Cryptosystems using linear groups. Appl. Algebra Eng. Commun. Comput. 17(3), 205\u2013217 (2006). \nhttps:\/\/doi.org\/10.1007\/s00200-006-0003-z","journal-title":"Appl. Algebra Eng. Commun. Comput."},{"key":"52_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-88702-7_1","volume-title":"Introduction to Post-Quantum Cryptography","author":"DJ Bernstein","year":"2009","unstructured":"Bernstein, D.J.: Introduction to Post-Quantum Cryptography, pp. 1\u201314. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-540-88702-7_1"},{"issue":"7671","key":"52_CR5","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1038\/nature23461","volume":"549","author":"DJ Bernstein","year":"2017","unstructured":"Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188\u2013194 (2017). \nhttps:\/\/doi.org\/10.1038\/nature23461","journal-title":"Nature"},{"key":"52_CR6","unstructured":"Bosset, J.: Contre les risques d\u2019alt\u00e9ration, un systeme de certification des informations. 01 Informatique 107, (1977)"},{"key":"52_CR7","unstructured":"Bromberg, L.: Some applications of noncommutative groups and semigroups to information security. Ph.D. thesis, Graduate Center, the City University of New York (2015)"},{"issue":"2","key":"52_CR8","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/s00233-015-9766-5","volume":"94","author":"L Bromberg","year":"2017","unstructured":"Bromberg, L., Shpilrain, V., Vdovina, A.: Navigating in the Cayley graph of $${SL}_2 (\\mathbb{F}_p)$$SL2(Fp) and applications to hashing. Semigroup Forum 94(2), 314\u2013324 (2017). \nhttps:\/\/doi.org\/10.1007\/s00233-015-9766-5","journal-title":"Semigroup Forum"},{"key":"52_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/3-540-16767-6_67","volume-title":"Applied Algebra, Algorithmics and Error-Correcting Codes","author":"P Camion","year":"1986","unstructured":"Camion, P.: Can a fast signature scheme without secret key be secure. In: Poli, A. (ed.) AAECC 1984. LNCS, vol. 228, pp. 215\u2013241. Springer, Heidelberg (1986). \nhttps:\/\/doi.org\/10.1007\/3-540-16767-6_67"},{"issue":"03n04","key":"52_CR10","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1142\/S0218196799000199","volume":"09","author":"J Cassaigne","year":"1999","unstructured":"Cassaigne, J., Harju, T., Karhum\u00e4ki, J.: On the undecidability of freeness of matrix semigroups. Int. J. Algebra Comput. 09(03n04), 295\u2013305 (1999). \nhttps:\/\/doi.org\/10.1142\/S0218196799000199","journal-title":"Int. J. Algebra Comput."},{"issue":"1","key":"52_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"DX Charles","year":"2009","unstructured":"Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93\u2013113 (2009). \nhttps:\/\/doi.org\/10.1007\/s00145-007-9002-x","journal-title":"J. Cryptol."},{"key":"52_CR12","unstructured":"Chorna, A., Geller, K., Shpilrain, V.: On two-generator subgroups in $${SL}_{2}(\\mathbb{Z})$$SL2(Z), $${SL}_{2}(\\mathbb{Q})$$SL2(Q) and $${SL}_{2}(\\mathbb{R})$$SL2(R). \narxiv.org\/abs\/1605.05226\n\n (2017)"},{"key":"52_CR13","doi-asserted-by":"publisher","unstructured":"Ghaffari, M.H., Mostaghim, Z.: More secure version of a Cayley hash function. Groups Complex. Cryptol. 10(1) (2018). \nhttps:\/\/doi.org\/10.1515\/gcc-2018-0002","DOI":"10.1515\/gcc-2018-0002"},{"issue":"1","key":"52_CR14","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/s00145-010-9063-0","volume":"24","author":"M Grassl","year":"2011","unstructured":"Grassl, M., Ili\u0107, I., Magliveras, S., Steinwandt, R.: Cryptanalysis of the Tillich-Z\u00e9mor hash function. J. Cryptol. 24(1), 148\u2013156 (2011). \nhttps:\/\/doi.org\/10.1007\/s00145-010-9063-0","journal-title":"J. Cryptol."},{"key":"52_CR15","unstructured":"Han, S., Masuda, A.M., Singh, S., Thiel, J.: Collision-free bounds for the BSV hash. \narxiv.org\/abs\/1703.02388v2\n\n (2017)"},{"key":"52_CR16","series-title":"Contemporary Mathematics","volume-title":"Algebra and Computer Science","year":"2016","unstructured":"Kahrobaei, D., Cavallo, B., Garber, D. (eds.): Algebra and Computer Science, vol. 677. American Mathematical Society (2016)"},{"key":"52_CR17","unstructured":"Monico, C.: Cryptanalysis of a hash function, and the modular subset sum problem (2018). \nhttp:\/\/www.math.ttu.edu\/~cmonico\/research\/linearhash.pdf"},{"key":"52_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7643-8827-0","volume-title":"Group-Based Cryptography","author":"A Myasnikov","year":"2008","unstructured":"Myasnikov, A., Shpilrain, V., Ushakov, A.: Group-Based Cryptography. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-7643-8827-0"},{"key":"52_CR19","unstructured":"Petit, C.: On graph-based cryptographic hash functions. Ph.D. thesis, Universit Catholique de Louvain (2009)"},{"key":"52_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-540-85855-3_18","volume-title":"Security and Cryptography for Networks","author":"C Petit","year":"2008","unstructured":"Petit, C., Lauter, K., Quisquater, J.-J.: Full cryptanalysis of LPS and morgenstern hash functions. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 263\u2013277. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-85855-3_18"},{"key":"52_CR21","unstructured":"Petit, C., Lauter, K.E., Quisquater, J.-J.: Cayley hashes: A class of efficient graph-based hash functions (2007). \nhttp:\/\/perso.uclouvain.be\/christophe.petit\/files\/Cayley.pdf"},{"key":"52_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-19574-7_20","volume-title":"Selected Areas in Cryptography","author":"C Petit","year":"2011","unstructured":"Petit, C., Quisquater, J.-J.: Preimages for the Tillich-Z\u00e9mor hash function. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 282\u2013301. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-19574-7_20"},{"issue":"6","key":"52_CR23","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1090\/noti1001","volume":"60","author":"C Petit","year":"2013","unstructured":"Petit, C., Quisquater, J.-J.: Rubik\u2019s for cryptographers. Not. Am. Math. Soc. 60(6), 733\u2013739 (2013)","journal-title":"Not. Am. Math. Soc."},{"key":"52_CR24","doi-asserted-by":"publisher","unstructured":"Shpilrain, V., Sosnovski, B.: Compositions of linear functions and applications to hashing. Groups Complex. Cryptol. 8(2), (2016). \nhttps:\/\/doi.org\/10.1515\/gcc-2016-0016","DOI":"10.1515\/gcc-2016-0016"},{"key":"52_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/3-540-57843-9_12","volume-title":"Algebraic Coding","author":"J-P Tillich","year":"1994","unstructured":"Tillich, J.-P., Z\u00e9mor, G.: Group-theoretic hash functions. In: Cohen, G., Litsyn, S., Lobstein, A., Z\u00e9mor, G. (eds.) Algebraic Coding 1993. LNCS, vol. 781, pp. 90\u2013110. Springer, Heidelberg (1994). \nhttps:\/\/doi.org\/10.1007\/3-540-57843-9_12"},{"key":"52_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/3-540-48658-5_5","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201994","author":"J-P Tillich","year":"1994","unstructured":"Tillich, J.-P., Z\u00e9mor, G.: Hashing with $$SL_2$$SL2. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 40\u201349. Springer, Heidelberg (1994). \nhttps:\/\/doi.org\/10.1007\/3-540-48658-5_5"},{"key":"52_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/3-540-46416-6_44","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"G Z\u00e9mor","year":"1991","unstructured":"Z\u00e9mor, G.: Hash functions and graphs with large girths. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 508\u2013511. Springer, Heidelberg (1991). \nhttps:\/\/doi.org\/10.1007\/3-540-46416-6_44"}],"container-title":["Lecture Notes in Computer Science","Mathematical Software \u2013 ICMS 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-96418-8_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,13]],"date-time":"2018-07-13T07:20:31Z","timestamp":1531466431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-96418-8_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319964171","9783319964188"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-96418-8_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}