An application of index forms in cryptography

被引:2
|
作者
Berczes, Attila [1 ]
Istvan Jarasi [1 ]
机构
[1] Univ Debrecen, Math Inst, Hungarian Acad Sci, Number Theory Res Grp, H-4010 Debrecen, Hungary
关键词
index form; hash function; FIELDS; EQUATIONS; ENCRYPTION; DESIGN;
D O I
10.1007/s10998-009-9035-8
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We investigate the possibility of using index forms as basic ingredients of cryptographically important functions. We suggest the use of a hash function based on index forms and we prove some important properties of the suggested function.
引用
收藏
页码:35 / 45
页数:11
相关论文
共 50 条
  • [1] An application of index forms in cryptography
    Attila Bérczes
    István Járási
    Periodica Mathematica Hungarica, 2009, 58 : 35 - 45
  • [2] Cryptography Based on Quadratic Forms: Complexity Considerations
    Hartung, Rupert J.
    RESEARCH IN CRYPTOLOGY, 2008, 4945 : 52 - 64
  • [3] Probability on groups and an application to cryptography
    Djimnaibeye, Sidoine
    Tieudjo, Daniel
    Youmbi, Norbert
    COMPUTER SCIENCE JOURNAL OF MOLDOVA, 2015, 23 (03) : 360 - 375
  • [4] Application of cellular automata for cryptography
    Bouvry, P
    Seredynski, F
    Zomaya, AY
    PARALLEL PROCESSING AND APPLIED MATHEMATICS, 2004, 3019 : 447 - 454
  • [5] Application of Genetics Algorithms in Cryptography
    Pekarcik, Peter
    Chovancova, Eva
    Chovanec, Martin
    Stancel, Martin
    28TH INTERNATIONAL CONFERENCE ON INTELLIGENT ENGINEERING SYSTEMS, INES 2024, 2024, : 181 - 186
  • [6] Research on the Application of Cryptography on the Blockchain
    Zhai, Sheping
    Yang, Yuanyuan
    Li, Jing
    Qiu, Cheng
    Zhao, Jiangming
    2018 INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SCIENCE AND APPLICATION TECHNOLOGY, 2019, 1168
  • [7] REDEI FUNCTIONS AND THEIR APPLICATION IN CRYPTOGRAPHY
    NOBAUER, R
    ACTA SCIENTIARUM MATHEMATICARUM, 1986, 50 (3-4): : 287 - 298
  • [8] Research on the Fusion Architecture and Application Mode of Quantum Cryptography and Classic Cryptography
    Li, Guochun
    Wang, Dong
    Cao, Can
    Qin, Hao
    Zhang, Li
    Zhao, Guanghuai
    2017 INTERNATIONAL CONFERENCE ON E-SOCIETY, E-EDUCATION AND E-TECHNOLOGY (ICSET 2017), 2015, : 28 - 32
  • [9] ERROR PROPAGATION PROPERTY AND APPLICATION IN CRYPTOGRAPHY
    PIEPRZYK, JP
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1989, 136 (04): : 262 - 270
  • [10] THE COMPLEXITY OF GRIGORCHUK GROUPS WITH APPLICATION TO CRYPTOGRAPHY
    GARZON, M
    ZALCSTEIN, Y
    THEORETICAL COMPUTER SCIENCE, 1991, 88 (01) : 83 - 98