Bucket Hashing with a Small Key Size
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[2] Hugo Krawczyk,et al. MMH: Software Message Authentication in the Gbit/Second Rates , 1997, FSE.
[3] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[4] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[5] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[6] Thomas Johansson,et al. On the cardinality of systematic authentication codes via error-correcting codes , 1996, IEEE Trans. Inf. Theory.
[7] Joos Vandewalle,et al. Fast Hashing on the Pentium , 1996, CRYPTO.
[8] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[9] F. MacWilliams,et al. Codes which detect deception , 1974 .
[10] Bart Preneel,et al. Cryptographic hash functions , 2010, Eur. Trans. Telecommun..
[11] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[12] Christian Gehrmann,et al. Fast Message Authentication Using Efficient Polynomial Evaluation , 1997, FSE.
[13] Bengt Jonsson,et al. CONCUR ’94: Concurrency Theory , 1994, Lecture Notes in Computer Science.
[14] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[15] Hugo Krawczyk,et al. New Hash Functions For Message Authentication , 1995, EUROCRYPT.
[16] Thomas Johansson. A shift register construction of unconditionally secure authentication codes , 1994, Des. Codes Cryptogr..
[17] Thomas Johansson,et al. On Families of Hash Functions via Geometric Codes and Concatenation , 1993, CRYPTO.
[18] Phillip Rogaway,et al. Bucket Hashing and Its Application to Fast Message Authentication , 1995, Journal of Cryptology.
[19] Bert den Boer. A Simple and Key-Economical Unconditional Authentication Scheme , 1993, J. Comput. Secur..
[20] Bart Preneel,et al. On the Security of Two MAC Algorithms , 1996, EUROCRYPT.
[21] Victor Shoup,et al. On Fast and Provably Secure Message Authentication Based on Universal Hashing , 1996, CRYPTO.
[22] Tor Helleseth,et al. Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.
[23] Thomas Johansson,et al. On the Relation between A-Codes and Codes Correcting Independent Errors , 1994, EUROCRYPT.
[24] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[25] T. Helleseth,et al. Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.
[26] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.