all InfoSec news
Hashing into quadratic residues modulo a safe prime composite
Sept. 4, 2023, 9 a.m. |
IACR News www.iacr.org
ePrint Report: Hashing into quadratic residues modulo a safe prime composite
Sietse Ringers
For $n = pq$ a product of two safe primes, we construct and prove security of a cryptographic hash function $H$ mapping into the square residues $QR_n \subset (\mathbb{Z}/n\mathbb{Z})^*$, by squaring the output of an ordinary cryptographic hash function $H$ of sufficiently long output.
cryptographic eprint report function hash hash function hashing mapping prime product prove report safe security square
More from www.iacr.org / IACR News
Secure Coded Distributed Computing
2 days, 5 hours ago |
www.iacr.org
Secure Implementation of SRAM PUF for Private Key Generation
2 days, 5 hours ago |
www.iacr.org
Multiple academic teaching positions
3 days, 4 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Assurance Security Specialist (IASS)
@ OBXtek Inc. | United States
Cyber Security Technology Analyst
@ Airbus | Bengaluru (Airbus)
Vice President, Cyber Operations Engineer
@ BlackRock | LO9-London - Drapers Gardens
Cryptography Software Developer
@ Intel | USA - AZ - Chandler
Lead Consultant, Geology
@ WSP | Richmond, VA, United States
BISO Cybersecurity Director
@ ABM Industries | Alpharetta, GA, United States