TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ramanujan graphs in cryptography [pdf]

26 点作者 aburan28将近 7 年前

1 comment

notveryrational将近 7 年前
While far from the current state of the art of practical cryptography, I have a very soft spot for &quot;theoretically constructed&quot; cryptographic hash functions.<p>I&#x27;ve encountered SWIFFT (which uses a lattice SVP), and some based on classic number theoretic functions (DLP).<p>Walks on expander graphs for cryptographic hashes are new for me. I&#x27;d seen them for applications in randomness extraction, but their application to cryptographic hashing really, really beautifully links well known graph problems (cycle finding and path finding) to collision and pre-image attacks.<p>This isn&#x27;t exactly what the paper is about (just the introductory material)... but something I felt moved to say. Hopefully someday we find very efficient expander graph constructs, because of how incredibly useful they continue to be in the theory.