Chen, Cong; Eisenbarth, Thomas; von Maurich, Ingo; Steinwandt, Rainer Differential power analysis of a McEliece cryptosystem. (English) Zbl 1423.94061 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 538-556 (2015). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Kepley, Shane; Steinwandt, Rainer Quantum circuits for \(\mathbb F_{2^n}\)-multiplication with subquadratic gate count. (English) Zbl 1327.81132 Quantum Inf. Process. 14, No. 7, 2373-2386 (2015). MSC: 81P68 81P94 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Eisenbarth, T.; Meyerowitz, A.; Steinwandt, R. On the security margin of MAC striping. (English) Zbl 1333.94054 Inf. Process. Lett. 115, No. 11, 899-902 (2015). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Roetteler, Martin; Steinwandt, Rainer A note on quantum related-key attacks. (English) Zbl 1358.94076 Inf. Process. Lett. 115, No. 1, 40-44 (2015). MSC: 94A60 81P94 81P68 × Cite Format Result Cite Review PDF Full Text: DOI arXiv
González Vasco, María Isabel; Steinwandt, Rainer Group theoretic cryptography. (English) Zbl 1321.94004 Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: CRC Press (ISBN 978-1-58488-836-9/hbk; 978-1-58488-837-6/ebook). xvii, 230 p. (2015). Reviewer: Gerhard Rosenberger (Hamburg) MSC: 94-02 94A60 11T71 20Exx 20Fxx 20Hxx × Cite Format Result Cite Review PDF Full Text: Link
Naccache, David; Steinwandt, Rainer; Suárez Corona, Adriana; Yung, Moti Narrow bandwidth is not inherent in reverse public-key encryption. (English) Zbl 1378.94057 Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 598-607 (2014). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Steinwandt, Rainer; Corona, Adriana Suárez Scalable attribute-based group key establishment: from passive to active and deniable. (English) Zbl 1342.94097 Appl. Algebra Eng. Commun. Comput. 25, No. 1-2, 1-20 (2014). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Klingler, Lee; Steinwandt, Rainer; Unruh, Dominique On using probabilistic Turing machines to model participants in cryptographic protocols. (English) Zbl 1296.68050 Theor. Comput. Sci. 501, 49-51 (2013). MSC: 68Q05 68Q87 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Neupane, Kashi; Steinwandt, Rainer; Suárez Corona, Adriana Scalable deniable group key establishment. (English) Zbl 1326.94129 Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 365-373 (2013). MSC: 94A62 68P25 68M12 × Cite Format Result Cite Review PDF Full Text: DOI
Steinwandt, Rainer; Suárez Corona, Adriana Identity-based non-interactive key distribution with forward security. (English) Zbl 1294.94080 Des. Codes Cryptography 64, No. 1-2, 195-208 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
González Muñiz, Madeline; Steinwandt, Rainer Security of message authentication codes in the presence of key-dependent messages. (English) Zbl 1259.94047 Des. Codes Cryptography 64, No. 1-2, 161-169 (2012). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Božović, Vladimir; Socek, Daniel; Steinwandt, Rainer; Villányi, Viktória I. Multi-authority attribute-based encryption with honest-but-curious central authority. (English) Zbl 1242.94019 Int. J. Comput. Math. 89, No. 3, 268-283 (2012). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Steinwandt, Rainer; Suárez Corona, Adriana Cryptanalysis of a 2-party key establishment based on a semigroup action problem. (English) Zbl 1213.94134 Adv. Math. Commun. 5, No. 1, 87-92 (2011). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI OA License
Grassl, Markus; Ilić, Ivana; Magliveras, Spyros; Steinwandt, Rainer Cryptanalysis of the Tillich-Zémor hash function. (English) Zbl 1209.94040 J. Cryptology 24, No. 1, 148-156 (2011). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Neupane, Kashi; Steinwandt, Rainer Communication-efficient 2-round group key establishment from pairings. (English) Zbl 1284.94143 Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 65-76 (2011). MSC: 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Steinwandt, Rainer; Suárez Corona, Adriana Attribute-based group key establishment. (English) Zbl 1213.94135 Adv. Math. Commun. 4, No. 3, 381-398 (2010). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
González Muñiz, Madeline; Steinwandt, Rainer Security of signature schemes in the presence of key-dependent messages. (English) Zbl 1287.94110 Tatra Mt. Math. Publ. 47, 15-29 (2010). MSC: 94A62 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link OA License
Geiselmann, Willi; Matheis, Kenneth; Steinwandt, Rainer PET SNAKE: a special purpose architecture to implement an algebraic attack in hardware. (English) Zbl 1366.94495 Gavrilova, Marina L. (ed.) et al., Transactions on Computational Science X. Special issue on security in computing, Part I. Berlin: Springer (ISBN 978-3-642-17498-8/pbk). Lecture Notes in Computer Science 6340. Journal Subline, 298-328 (2010). MSC: 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Mullin, Ronald C.; Steinwandt, Rainer Special issue dedicated to Spyros Magliveras on the occasion of his 70th birthday. (English) Zbl 1187.94006 Des. Codes Cryptography 55, No. 2-3, 103-105 (2010). MSC: 94-06 94A60 01A70 × Cite Format Result Cite Review PDF Full Text: DOI
Steinwandt, Rainer A ciphertext-only attack on Polly Two. (English) Zbl 1184.94245 Appl. Algebra Eng. Commun. Comput. 21, No. 2, 85-92 (2010). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Steinwandt, Rainer (ed.); Geiselmann, Willi (ed.); Koç, Çetin Kaya (ed.) Guest editors’ introduction to the special section on special-purpose hardware for cryptography and cryptanalysis. (English) Zbl 1367.94007 IEEE Trans. Comput. 57, No. 11, 1441-1442 (2008). MSC: 94-06 68-06 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Geiselmann, Willi; Steinwandt, Rainer Cryptanalysis of a hash function proposed at ICISC 2006. (English) Zbl 1278.94050 Nam, Kil-Hyun (ed.) et al., Information security and cryptology – ICISC 2007. 10th international conference, Seoul, Korea, November 29–30, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76787-9/pbk). Lecture Notes in Computer Science 4817, 1-10 (2007). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Geiselmann, Willi; Steinwandt, Rainer Non-wafer-scale sieving hardware for the NFS: Another attempt to cope with 1024-bit. (English) Zbl 1141.94355 Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 466-481 (2007). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Abdalla, Michel; Bohli, Jens-Matthias; González Vasco, María Isabel; Steinwandt, Rainer (Password) authenticated key establishment: from 2-party to group. (English) Zbl 1129.94040 Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 499-514 (2007). MSC: 94A62 94A60 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Bohli, Jens-Matthias; Glas, Benjamin; Steinwandt, Rainer Towards provably secure group key agreement building on group theory. (English) Zbl 1295.94025 Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 322-336 (2006). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Bohli, Jens-Matthias; Steinwandt, Rainer Deniable group key agreement. (English) Zbl 1295.94026 Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 298-311 (2006). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Groch, Anja; Hofheinz, Dennis; Steinwandt, Rainer A practical attack on the root problem in braid groups. (English) Zbl 1207.94054 Gerritzen, Lothar (ed.) et al., Algebraic methods in cryptography. AMS/DMV joint international meeting, June 16–19, 2005, Mainz, Germany. International workshop on algebraic methods in cryptography, November 17–18, 2005, Bochum, Germany. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-4037-1/pbk). Contemporary Mathematics 418, 121-131 (2006). MSC: 94A60 20F36 × Cite Format Result Cite Review PDF
Gonzáles Vasco, María Isabel; Steinwandt, Rainer; Villar, Jorge L. Towards provable security for cryptographic constructions arising form combinatorial group theory. (English) Zbl 1201.94085 Gerritzen, Lothar (ed.) et al., Algebraic methods in cryptography. AMS/DMV joint international meeting, June 16–19, 2005, Mainz, Germany. International workshop on algebraic methods in cryptography, November 17–18, 2005, Bochum, Germany. Providence, RI: American Mathematical Society (AMS) (ISBN 0-8218-4037-1/pbk). Contemporary Mathematics 418, 89-101 (2006). MSC: 94A60 20F10 × Cite Format Result Cite Review PDF
Geiselmann, Willi; Januszewski, Fabian; Köpfer, Hubert; Pelzl, Jan; Steinwandt, Rainer A simpler sieving device: combining ECM and TWIRL. (English) Zbl 1272.94031 Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 118-135 (2006). MSC: 94A60 14G50 11Y16 × Cite Format Result Cite Review PDF Full Text: DOI
González Vasco, María Isabel; Steinwandt, Rainer Pitfalls in public key cryptosystems based on free partially commutative monoids and groups. (English) Zbl 1136.94005 Appl. Math. Lett. 19, No. 10, 1037-1041 (2006). Reviewer: Massimo Giuletti (Perugia) MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Link
Bohli, Jens-Matthias; Glas, Benjamin; Steinwandt, Rainer Algebraic cryptosystems and side channel attacks: braid groups and DPA. (English) Zbl 1131.94011 Congr. Numerantium 182, 145-154 (2006). MSC: 94A60 20F36 × Cite Format Result Cite Review PDF
Vasco, María Isabel González; Steinwandt, Rainer Chosen ciphertext attacks as common vulnerability of some group- and polynomial-based encryption schemes. (English) Zbl 1174.94016 Tatra Mt. Math. Publ. 33, 149-157 (2006). Reviewer: Michal Šramka (Calgary) MSC: 94A60 × Cite Format Result Cite Review PDF
Hofheinz, Dennis; Müller-Quade, Jörn; Steinwandt, Rainer On IND-CCA security modeling in cryptographic protocols. (English) Zbl 1174.94359 Tatra Mt. Math. Publ. 33, 83-97 (2006). MSC: 94A60 × Cite Format Result Cite Review PDF
Bohli, Jens-Matthias; Steinwandt, Rainer On subliminal channels in deterministic signature schemes. (English) Zbl 1133.94309 Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 182-194 (2005). MSC: 94A60 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Bohli, Jens-Matthias; Steinwandt, Rainer; González Vasco, María Isabel; Martínez, Consuelo Weak keys in MST\(_{1}\). (English) Zbl 1114.94006 Des. Codes Cryptography 37, No. 3, 509-524 (2005). MSC: 94A60 20B40 × Cite Format Result Cite Review PDF Full Text: DOI
Geiselmann, Willi; Steinwandt, Rainer A key substitution attack on \(\text{SFLASH}^{v3}\). (English) Zbl 1080.94524 J. Discrete Math. Sci. Cryptography 8, No. 2, 137-141 (2005). MSC: 94A60 94A62 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
González Vasco, María Isabel; Martínez, Consuelo; Steinwandt, Rainer; Villar, Jorge L. A new Cramer-Shoup like methodology for group based provably secure encryption schemes. (English) Zbl 1079.94575 Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 495-509 (2005). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Raub, Dominik; Steinwandt, Rainer; Müller-Quade, Jörn On the security and composability of the one time pad. (English) Zbl 1117.94307 Vojtáš, Peter (ed.) et al., SOFSEM 2005: Theory and practice of computer science. 31st conference on current trends in theory and practice of computer science, Liptovský Ján, Slovakia, January 22–28, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24302-X/pbk). Lecture Notes in Computer Science 3381, 288-297 (2005). MSC: 94A40 68P25 × Cite Format Result Cite Review PDF Full Text: DOI
Geiselmann, Willi; Steinwandt, Rainer Power attacks on a side-channel resistant elliptic curve implementation. (English) Zbl 1177.68083 Inf. Process. Lett. 91, No. 1, 29-32 (2004). MSC: 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Geiselmann, Willi; Steinwandt, Rainer Yet another sieving device. (English) Zbl 1196.68016 Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 278-291 (2004). MSC: 68M07 11T71 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
González Vasco, María Isabel; Martínez, Consuelo; Steinwandt, Rainer Towards a uniform description of several group based cryptographic primitives. (English) Zbl 1063.94074 Des. Codes Cryptography 33, No. 3, 215-226 (2004). MSC: 94A60 20F10 20F05 × Cite Format Result Cite Review PDF Full Text: DOI
González Vasco, María Isabel; Steinwandt, Rainer A reaction attack on a public key cryptosystem based on the word problem. (English) Zbl 1058.94014 Appl. Algebra Eng. Commun. Comput. 14, No. 5, 335-340 (2004). MSC: 94A60 20F10 20F05 × Cite Format Result Cite Review PDF Full Text: DOI
González Vasco, M. I.; Hofheinz, D.; Martínez, C.; Steinwandt, R. On the security of two public key cryptosystems using non-abelian groups. (English) Zbl 1050.94008 Des. Codes Cryptography 32, No. 1-3, 207-216 (2004). MSC: 94A60 20F10 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
Hofheinz, Dennis; Müller-Quade, Jörn; Steinwandt, Rainer Initiator-resilient universally composable key exchange. (English) Zbl 1482.94052 Snekkenes, Einar (ed.) et al., Computer security – ESORICS 2003. 8th European symposium on research in computer security, Gjøvik, Norway, October 13–15, 2003. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2808, 61-84 (2003). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
Geiselmann, Willi; Steinwandt, Rainer Hardware to solve sparse systems of linear equations over GF(2). (English) Zbl 1274.94069 Walter, Colin D. (ed.) et al., Cryptographic hardware and embedded systems – CHES 2003. 5th international workshop, Cologne, Germany, September 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40833-9/pbk). Lect. Notes Comput. Sci. 2779, 51-61 (2003). MSC: 94A60 11Y05 68W35 × Cite Format Result Cite Review PDF Full Text: DOI
Geiselmann, Willi; Steinwandt, Rainer A redundant representation of \(\text{GF}(q^n)\) for designing arithmetic circuits. (English) Zbl 1192.11081 IEEE Trans. Comput. 52, No. 7, 848-853 (2003). MSC: 11T71 94C05 × Cite Format Result Cite Review PDF Full Text: DOI
González Vasco, María Isabel; Rötteler, Martin; Steinwandt, Rainer On minimal length factorizations of finite groups. (English) Zbl 1047.94014 Exp. Math. 12, No. 1, 1-12 (2003). MSC: 94A62 20D60 20D40 20E32 94A60 × Cite Format Result Cite Review PDF Full Text: DOI Euclid EuDML
Steinwandt, Rainer; Geiselmann, Willi Cryptanalysis of Polly Cracker. (English) Zbl 1062.94042 IEEE Trans. Inf. Theory 48, No. 11, 2990-2991 (2002). MSC: 94A60 × Cite Format Result Cite Review PDF Full Text: DOI
González Vasco, María I.; Steinwandt, Rainer Obstacles in two public key cryptosystems based on group factorizations. (English) Zbl 1049.94010 Tatra Mt. Math. Publ. 25, 23-37 (2002). MSC: 94A60 × Cite Format Result Cite Review PDF
Geiselmann, Willi; Steinwandt, Rainer Cryptanalysis of a knapsack-like cryptosystem. (English) Zbl 1026.94007 Period. Math. Hung. 45, No. 1-2, 35-41 (2002). Reviewer: Carlos Munuera (Valladolid) MSC: 94A60 11A63 × Cite Format Result Cite Review PDF Full Text: DOI
Geiselmann, Willi; Steinwandt, Rainer A dedicated sieving hardware. (English) Zbl 1033.94567 Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 254-266 (2002). MSC: 94A60 11Y05 94C05 × Cite Format Result Cite Review PDF Full Text: DOI
Hofheinz, Dennis; Steinwandt, Rainer A practical attack on some braid group based cryptographic primitives. (English) Zbl 1033.94528 Desmedt, Yvo G. (ed.) et al., Public key cryptography – PKC 2003. 6th international workshop on practice and theory in public key cryptography, Miami, FL, USA, January 6–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00324-X/pbk). Lect. Notes Comput. Sci. 2567, 187-198 (2002). MSC: 94A60 20F36 × Cite Format Result Cite Review PDF Full Text: DOI
Steinwandt, Rainer; Geiselmann, Willi; Beth, Thomas A theoretical DPA-based cryptanalysis of the NESSIE candidates FLASH and SFLASH. (English) Zbl 1042.68593 Davida, George I. (ed.) et al., Information security. 4th international conference, ISC 2001, Malaga, Spain, October 1–3, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42662-0). Lect. Notes Comput. Sci. 2200, 280-293 (2001). MSC: 68P25 94A60 × Cite Format Result Cite Review PDF Full Text: Link
Geiselmann, Willi; Steinwandt, Rainer; Beth, Thomas Attacking the affine parts of SFLASH. (English) Zbl 0999.94555 Honary, Bahram (ed.), Cryptography and coding. 8th IMA international conference, Cirencester, GB, December 17-19, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2260, 355-359 (2001). MSC: 94A62 × Cite Format Result Cite Review PDF Full Text: DOI
González Vasco, María Isabel; Steinwandt, Rainer Clouds over a public key cryptosystem based on Lyndon words. (English) Zbl 1005.94530 Inf. Process. Lett. 80, No. 5, 239-242 (2001). MSC: 94A60 68R15 68Q45 × Cite Format Result Cite Review PDF Full Text: DOI
Steinwandt, Rainer Loopholes in two public key cryptosystems using the modular group. (English) Zbl 0991.94047 Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 180-189 (2001). MSC: 94A60 11F06 × Cite Format Result Cite Review PDF
Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun Cryptanalysis of two sparse polynomial based public key cryptosystems. (English) Zbl 0988.94510 Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 153-164 (2001). MSC: 94A60 × Cite Format Result Cite Review PDF
Steinwandt, Rainer; Grassl, Markus; Geiselmann, Willi; Beth, Thomas Weaknesses in the \(\mathrm{SL}_2(\mathbb F_{2^n})\) hashing scheme. (English) Zbl 0995.94542 Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 287-299 (2000). MSC: 94A60 × Cite Format Result Cite Review PDF