𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Cryptographic Hash Functions from Expander Graphs

✍ Scribed by Denis X. Charles; Kristin E. Lauter; Eyal Z. Goren


Publisher
Springer
Year
2007
Tongue
English
Weight
372 KB
Volume
22
Category
Article
ISSN
0933-2790

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Hash functions and Cayley graphs
✍ Gilles ZΓ©mor πŸ“‚ Article πŸ“… 1994 πŸ› Springer 🌐 English βš– 659 KB
Quasi-power functionals for potential fi
✍ G.J. Savage; H.K. Kesavan πŸ“‚ Article πŸ“… 1982 πŸ› Elsevier Science 🌐 English βš– 558 KB

Quasi-power functionals have been traditionally derived through the Method of Weighted Residuals (MWR) and used as the starting formulation for the finite element method. In this paper, we derive similar but more complete functionals for potential fields through a novel approach. We first form discr