Report - Cryptographic Hash Functions from Expander Graphs · Cryptographic Hash Functions from Expander Graphs 95 For the LPS graphs, the underlying hard problem is a representation problem

Please pass captcha verification before submit form