Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cryptographic Hash Functions from Arc-Transitive Graphs - Part 1

TheIACR via YouTube

Overview

Explore a conference talk on cryptographic hash functions derived from arc-transitive graphs. Delve into the construction requirements, collision resistance, and comparisons with Cayley hash functions. Examine the triplet graph, adjacency relations of sextet graphs, and the underlying group H of the group word problem. Analyze potential attacks, performance considerations, and outstanding challenges in this cutting-edge area of cryptography.

Syllabus

Intro
Cryptographic Hash Function (CHF)
Candidates of CHF from graph & group theories
Constructing Requirements of CHF based on graph & group theories (1/2)
Collision resistance.
Comparison with Cayley hash functions
Preliminaries
Triplet graph
An adjacency relation of sextet graph
Proposed hash (would) have no short collisions.
The underlying group H of the group word problem
Possible attacks
Performance
Summary & Problems

Taught by

TheIACR

Reviews

Start your review of Cryptographic Hash Functions from Arc-Transitive Graphs - Part 1

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.