A note on lower bounds for non-interactive message authentication using weak keys
暂无分享,去创建一个
[1] T. Helleseth,et al. Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.
[2] Douglas R. Stinson. Universal Hashing and Authentication Codes , 1991, CRYPTO.
[3] Yevgeniy Dodis,et al. Does Privacy Require True Randomness? , 2007, TCC.
[4] Serge Fehr,et al. On the Conditional Rényi Entropy , 2014, IEEE Transactions on Information Theory.
[5] Joel H. Spencer,et al. On the (non)universality of the one-time pad , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..