On Fast and Provably Secure Message Authentication Based on Universal Hashing
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[2] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[3] F. MacWilliams,et al. Codes which detect deception , 1974 .
[4] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[5] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[6] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[7] Erich Kaltofen,et al. On Wiedemann's Method of Solving Sparse Linear Systems , 1991, AAECC.
[8] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[9] A. K. Lenstra,et al. Compact incremental Gaussian Elimination over Z/2Z , 1988 .
[10] Phillip Rogaway. Bucket Hashing and its Application to Fast Message Authentication , 1995, CRYPTO.
[11] J. Gordon. Very simple method to find the minimum polynomial of an arbitrary nonzero element of a finite field , 1976 .
[12] Douglas H. Wiedemann. Solving sparse linear equations over finite fields , 1986, IEEE Trans. Inf. Theory.
[13] Gilles Brassard,et al. On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys , 1982, CRYPTO.
[14] Joos Vandewalle,et al. Fast Hashing on the Pentium , 1996, CRYPTO.
[15] Marvin C. Wunderlich,et al. A compact algorithm for Gaussian elimination over GF(2) implemented on highly parallel computers , 1984, Parallel Comput..
[16] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[17] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[18] Ramarathnam Venkatesan,et al. Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel , 1996, EUROCRYPT.