Bucket hashing and its application to fast message authentication
From MaRDI portal
Recommendations
Cited in
(15)- The circulant hash revisited
- Fast message authentication using efficient polynomial evaluation
- The universality of iterated hashing over variable-length strings
- scientific article; zbMATH DE number 1962142 (Why is no real title available?)
- Tight security of cascaded LRW2
- SipHash: a fast short-input PRF
- A construction method for optimally universal hash families and its consequences for the existence of RBIBDs
- scientific article; zbMATH DE number 1418298 (Why is no real title available?)
- Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
- A trade-off between collision probability and key size in universal hashing using polynomials
- Badger – A Fast and Provably Secure MAC
- Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling
- A new multi-linear universal hash family
- scientific article; zbMATH DE number 1980973 (Why is no real title available?)
- \(\Gamma\)-MAC\([H,P]\) -- a new universal MAC scheme
This page was built for publication: Bucket hashing and its application to fast message authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1291805)