A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Discrete Logarithm Variants of VSH
[chapter]
2006
Lecture Notes in Computer Science
Recent attacks on standardised hash functions such as SHA1 have reawakened interest in design strategies based on techniques common in provable security. In presenting the VSH hash function, a design based on RSA-like modular exponentiation, the authors introduce VSH-DL, a design based on exponentiation in DLP-based groups. In this article we explore a variant of VSH-DL that is based on cyclotomic subgroups of finite fields; we show that one can tradeoff performance against bandwidth by using
doi:10.1007/11958239_15
fatcat:pjm6idipe5eahk5udv4pign3gm