{"id":"https://openalex.org/W2126626229","doi":"https://doi.org/10.1109/icecs.2008.4675001","title":"Efficiency and pseudo-randomness of a variant of Z&amp;#x00E9;mor-Tillich hash function","display_name":"Efficiency and pseudo-randomness of a variant of Z&amp;#x00E9;mor-Tillich hash function","publication_year":2008,"publication_date":"2008-08-01","ids":{"openalex":"https://openalex.org/W2126626229","doi":"https://doi.org/10.1109/icecs.2008.4675001","mag":"2126626229"},"language":"en","primary_location":{"id":"doi:10.1109/icecs.2008.4675001","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecs.2008.4675001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 15th IEEE International Conference on Electronics, Circuits and Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046548183","display_name":"Christophe Petit","orcid":"https://orcid.org/0000-0003-3482-6743"},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]},{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["BE","GB"],"is_corresponding":true,"raw_author_name":"Christophe Petit","raw_affiliation_strings":["Crypto Group, University College London, Louvain-la-Neuve, Belgium","UCL-Crypto Group, Louvain-la-Neuve"],"affiliations":[{"raw_affiliation_string":"Crypto Group, University College London, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353","https://openalex.org/I45129253"]},{"raw_affiliation_string":"UCL-Crypto Group, Louvain-la-Neuve","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037706770","display_name":"Nicolas Veyrat-Charvillon","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]},{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["BE","GB"],"is_corresponding":false,"raw_author_name":"Nicolas Veyrat-Charvillon","raw_affiliation_strings":["Crypto Group, University College London, Louvain-la-Neuve, Belgium","UCL-Crypto Group, Louvain-la-Neuve"],"affiliations":[{"raw_affiliation_string":"Crypto Group, University College London, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353","https://openalex.org/I45129253"]},{"raw_affiliation_string":"UCL-Crypto Group, Louvain-la-Neuve","institution_ids":["https://openalex.org/I95674353"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108457109","display_name":"Jean-Jacques Quisquater","orcid":null},"institutions":[{"id":"https://openalex.org/I95674353","display_name":"UCLouvain","ror":"https://ror.org/02495e989","country_code":"BE","type":"education","lineage":["https://openalex.org/I95674353"]},{"id":"https://openalex.org/I45129253","display_name":"University College London","ror":"https://ror.org/02jx3x895","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I45129253"]}],"countries":["BE","GB"],"is_corresponding":false,"raw_author_name":"Jean-Jacques Quisquater","raw_affiliation_strings":["Crypto Group, University College London, Louvain-la-Neuve, Belgium","UCL-Crypto Group, Louvain-la-Neuve"],"affiliations":[{"raw_affiliation_string":"Crypto Group, University College London, Louvain-la-Neuve, Belgium","institution_ids":["https://openalex.org/I95674353","https://openalex.org/I45129253"]},{"raw_affiliation_string":"UCL-Crypto Group, Louvain-la-Neuve","institution_ids":["https://openalex.org/I95674353"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046548183"],"corresponding_institution_ids":["https://openalex.org/I45129253","https://openalex.org/I95674353"],"apc_list":null,"apc_paid":null,"fwci":3.4323,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.92760007,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"906","last_page":"909"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.9036997556686401},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.7482748627662659},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.6712356805801392},{"id":"https://openalex.org/keywords/collision-resistance","display_name":"Collision resistance","score":0.648604154586792},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.6015464663505554},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.5710089206695557},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5447413325309753},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5024590492248535},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.46858638525009155},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4638177752494812},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4483283758163452},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.44132405519485474},{"id":"https://openalex.org/keywords/universal-hashing","display_name":"Universal hashing","score":0.4274137616157532},{"id":"https://openalex.org/keywords/swifft","display_name":"SWIFFT","score":0.4231688976287842},{"id":"https://openalex.org/keywords/security-of-cryptographic-hash-functions","display_name":"Security of cryptographic hash functions","score":0.41734570264816284},{"id":"https://openalex.org/keywords/dynamic-perfect-hashing","display_name":"Dynamic perfect hashing","score":0.41643598675727844},{"id":"https://openalex.org/keywords/rolling-hash","display_name":"Rolling hash","score":0.4131196439266205},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.38491418957710266},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.08721593022346497},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.07312482595443726},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06011509895324707}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.9036997556686401},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.7482748627662659},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.6712356805801392},{"id":"https://openalex.org/C150909736","wikidata":"https://www.wikidata.org/wiki/Q1779448","display_name":"Collision resistance","level":5,"score":0.648604154586792},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.6015464663505554},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.5710089206695557},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5447413325309753},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5024590492248535},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.46858638525009155},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4638177752494812},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4483283758163452},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.44132405519485474},{"id":"https://openalex.org/C116058348","wikidata":"https://www.wikidata.org/wiki/Q846912","display_name":"Universal hashing","level":5,"score":0.4274137616157532},{"id":"https://openalex.org/C133358856","wikidata":"https://www.wikidata.org/wiki/Q7395188","display_name":"SWIFFT","level":5,"score":0.4231688976287842},{"id":"https://openalex.org/C165511393","wikidata":"https://www.wikidata.org/wiki/Q7252276","display_name":"Security of cryptographic hash functions","level":5,"score":0.41734570264816284},{"id":"https://openalex.org/C122907437","wikidata":"https://www.wikidata.org/wiki/Q5318999","display_name":"Dynamic perfect hashing","level":5,"score":0.41643598675727844},{"id":"https://openalex.org/C108546238","wikidata":"https://www.wikidata.org/wiki/Q4228982","display_name":"Rolling hash","level":5,"score":0.4131196439266205},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.38491418957710266},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.08721593022346497},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.07312482595443726},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06011509895324707},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/icecs.2008.4675001","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icecs.2008.4675001","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 15th IEEE International Conference on Electronics, Circuits and Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:67705","is_oa":false,"landing_page_url":"http://hdl.handle.net/2078.1/67705","pdf_url":null,"source":{"id":"https://openalex.org/S4306401902","display_name":"Digital Access to Libraries (Universit\u00e9 catholique de Louvain (UCL), l'Universit\u00e9 de Namur (UNamur) and the Universit\u00e9 Saint-Louis (USL-B))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I95674353","host_organization_name":"UCLouvain","host_organization_lineage":["https://openalex.org/I95674353"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},{"id":"pmh:oai:dipot.ulb.ac.be:2013/321949","is_oa":false,"landing_page_url":"http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/321949","pdf_url":null,"source":{"id":"https://openalex.org/S4306401063","display_name":"D\u00e9p\u00f4t institutionnel de l'Universit\u00e9 libre de Bruxelles (Universit\u00e9 Libre de Bruxelles)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I132053463","host_organization_name":"Universit\u00e9 Libre de Bruxelles","host_organization_lineage":["https://openalex.org/I132053463"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"In: Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008","raw_type":"info:ulb-repo/semantics/openurl/proceeding"},{"id":"pmh:oai:pure.atira.dk:openaire_cris_publications/c13c9272-2627-4394-86f1-098a9e5642de","is_oa":false,"landing_page_url":"https://research.birmingham.ac.uk/en/publications/c13c9272-2627-4394-86f1-098a9e5642de","pdf_url":null,"source":{"id":"https://openalex.org/S4306402634","display_name":"University of Birmingham Research Portal (University of Birmingham)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79619799","host_organization_name":"University of Birmingham","host_organization_lineage":["https://openalex.org/I79619799"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Petit, C, Veyrat-Charvillon, N & Quisquater, J J 2008, Efficiency and pseudo-randomness of a variant of Z\u00e9mor-Tillich hash function. in Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008., 4675001, Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008, pp. 906-909, 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008, St. Julian's, Malta, 31/08/08. https://doi.org/10.1109/ICECS.2008.4675001","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4699999988079071}],"awards":[],"funders":[{"id":"https://openalex.org/F4320318621","display_name":"Waalse Gewest","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1015038838","https://openalex.org/W1526708853","https://openalex.org/W1583471030","https://openalex.org/W1626445927","https://openalex.org/W1656731780","https://openalex.org/W1886344012","https://openalex.org/W2000932900","https://openalex.org/W2134403686","https://openalex.org/W2165769538","https://openalex.org/W2401634753","https://openalex.org/W2917891478"],"related_works":["https://openalex.org/W4385414528","https://openalex.org/W3023506926","https://openalex.org/W1487949331","https://openalex.org/W1972792640","https://openalex.org/W2227130482","https://openalex.org/W2342330140","https://openalex.org/W2332259278","https://openalex.org/W2380122294","https://openalex.org/W1985195644","https://openalex.org/W2119251656"],"abstract_inverted_index":{"Recent":[0],"breakthroughs":[1],"concerning":[2],"the":[3,29,36,130,142,165],"current":[4],"standard":[5],"SHA-1":[6],"prompted":[7],"NIST":[8],"to":[9,35,105,128,149],"launch":[10],"a":[11,14,52,72,77],"competition":[12],"for":[13],"new":[15],"secure":[16,25,79],"hash":[17,26,80,116,134,147,157],"algorithm":[18],"by":[19,42,83,88],"X.Wang":[20],"et":[21,45],"al":[22,46],"(2005).":[23],"Provably":[24],"functions":[27,64,148],"(in":[28],"sense":[30],"that":[31,155],"their":[32],"security":[33,99,120],"relates":[34],"hardness":[37],"of":[38,55,74,132,141],"some":[39,95],"mathematical":[40],"problems":[41],"V.":[43],"Lyubashevsky":[44],"(2006)":[47],"are":[48,58],"particularly":[49],"interesting":[50],"from":[51],"theoretical":[53],"point":[54],"view":[56],"but":[57],"often":[59],"much":[60],"slower":[61],"than":[62],"heuristic":[63],"like":[65],"SHA.":[66],"In":[67],"this":[68,106,150],"paper,":[69],"we":[70,153],"consider":[71],"variant":[73],"ZT":[75,115],"hash,":[76],"provably":[78],"function":[81,109,139,158],"designed":[82],"Zemor":[84],"and":[85,91,117,126],"Tillich":[86],"proposed":[87],"J.P":[89],"Tilich":[90],"G.Zemor":[92],"(1994).":[93],"Despite":[94],"attack":[96],"proposals,":[97],"its":[98],"has":[100,118],"not":[101],"been":[102],"fundamentally":[103],"challenged":[104],"day.":[107,151],"Our":[108],"is":[110],"twice":[111],"as":[112,114],"fast":[113],"enhanced":[119],"properties.":[121],"We":[122],"propose":[123],"optimized":[124],"parameters":[125],"algorithms":[127],"increase":[129],"speed":[131],"both":[133],"functions.":[135],"This":[136],"makes":[137],"our":[138,156],"one":[140],"most":[143,161],"efficient":[144],"ldquoprovably":[145],"securerdquo":[146],"Finally,":[152],"show":[154],"successfully":[159],"passes":[160],"pseudo-randomness":[162],"tests":[163],"in":[164],"Dieharder":[166],"suite.":[167]},"counts_by_year":[{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
