@inproceedings{860d310d5d4d4b9390444cdadb192eaf,
title = "Attacking the SL2 hashing scheme",
abstract = "Tillich and Zemor proposed a definition of a new hash function which uses SL2(2,2n), the group of unimodular two-dimensional matrices with entries in GF(2n), to compute the hash values of binary strings. This hashing scheme has several attractive features; hash values can be computed quickly and small modifications to the input text can be detected. However, this scheme is weak. Using a group theoretic argument we are able to produce two distinct binary strings of small length which hash to the same value in SL2(2,2n) for the range specified by Tillich and Z{\'e}mor.",
author = "Chris Charnes and Josef Pieprzyk",
year = "1995",
doi = "10.1007/BFb0000444",
language = "English",
isbn = "9783540593393",
volume = "917",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "322--330",
booktitle = "Advances in Cryptology - ASIACRYPT 1994 - 4th International Conference on the Theory and Applications of Cryptology, Proceedings",
address = "United States",
note = "4th International Conference on the Theory and Applications of Cryptology, ASIACRYPT 1994 ; Conference date: 28-11-1994 Through 01-12-1994",
}