MMH: Software message authentication in the Gbit/second rates

From MaRDI portal
Revision as of 15:38, 7 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4639339

DOI10.1007/BFb0052345zbMath1385.94039MaRDI QIDQ4639339

Hugo Krawczyk, Shai Halevi

Publication date: 9 May 2018

Published in: Fast Software Encryption (Search for Journal in Brave)




Related Items (24)

MMH* with arbitrary modulus is always almost-universalVariationally universal hashingIncremental cryptography revisited: PRFs, nonces and modular designOptimal forgeries against polynomial-based MACs and GCMA new multi-linear universal hash familyConnecting tweakable and multi-key blockcipher securityQuantum linearization attacksOn weak keys and forgery attacks against polynomial-based MAC schemesTweakable enciphering schemes using only the encryption function of a block cipherA trade-off between collision probability and key size in universal hashing using polynomialsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityOn Efficient Message Authentication Via Block Cipher Design TechniquesRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesОб одном семействе универсальных функций хешированияOn rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorKey-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsRevisiting construction of online cipher in hash-ECB-hash structureMMHBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACQuantum key distribution using universal hash functions over finite fieldsAn efficient hybrid hash based privacy amplification algorithm for quantum key distribution




Cites Work




This page was built for publication: MMH: Software message authentication in the Gbit/second rates