Показать сокращенную информацию
dc.contributor.author | Ziatdinov M. | |
dc.date.accessioned | 2018-09-19T22:10:41Z | |
dc.date.available | 2018-09-19T22:10:41Z | |
dc.date.issued | 2016 | |
dc.identifier.issn | 1995-0802 | |
dc.identifier.uri | https://dspace.kpfu.ru/xmlui/handle/net/144817 | |
dc.description.abstract | © 2016, Pleiades Publishing, Ltd.We present two new constructions of quantum hash functions: the first based on expander graphs and the second based on extractor functions and estimate the amount of randomness that is needed to construct them. We also propose a keyed quantum hash function based on extractor function that can be used in quantum message authentication codes and assess its security in a limited attacker model. | |
dc.relation.ispartofseries | Lobachevskii Journal of Mathematics | |
dc.subject | expander graph | |
dc.subject | extractor | |
dc.subject | keyed quantum hash function | |
dc.subject | message authentication | |
dc.subject | Quantum hash function | |
dc.title | From graphs to keyed quantum hash functions | |
dc.type | Article | |
dc.relation.ispartofseries-issue | 6 | |
dc.relation.ispartofseries-volume | 37 | |
dc.collection | Публикации сотрудников КФУ | |
dc.relation.startpage | 705 | |
dc.source.id | SCOPUS19950802-2016-37-6-SID84994499952 |