New hash functions and their use in authentication and set equality
From MaRDI portal
Publication:1152713
DOI10.1016/0022-0000(81)90033-7zbMath0461.68074OpenAlexW1985623009MaRDI QIDQ1152713
J. Lawrence Carter, Mark N. Wegman
Publication date: 1981
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/0022-0000(81)90033-7
hashingadd member to setdelete member from setprovably secure authentication techniquetest two sets for equality
Data encryption (aspects in computer science) (68P25) Information storage and retrieval of data (68P20) Authentication, digital signatures and secret sharing (94A62)
Related Items
On the security of RSA textbook signature scheme on Paillier ciphertext, BBB Secure Nonce Based MAC Using Public Permutations, Universal Hashing and Multiple Authentication, Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings, On Fast and Provably Secure Message Authentication Based on Universal Hashing, Quantum Key Distribution and String Oblivious Transfer in Noisy Channels, Quantum Security Analysis via Smoothing of Renyi Entropy of Order 2, Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes, Two-way unclonable encryption with a vulnerable sender, Sample(x)=(a*x<=t) Is a Distinguisher with Probability 1/8, Unconditional Byzantine agreement for any number of faulty processors, Wireless-channel key exchange, Multi-instance secure public-key encryption, FPT-Algorithms for the \(\ell\) -Matchoid Problem with a Coverage Objective, The gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functions, Authenticated Encryption Mode for Beyond the Birthday Bound Security, Distribution of secret keys in a quantum network with trusted intermediate nodes;Распределение секретных ключей в квантовой сети с доверенными промежуточными узлами, Categorization of faulty nonce misuse resistant message authentication, Quantum attacks on PRFs based on public random permutations, Universal hashing based on field multiplication and (near-)MDS matrices, On the security of keyed hashing based on public permutations, SECURITY OF QUANTUM KEY DISTRIBUTION, Unnamed Item, Unnamed Item, An Improved Robust Fuzzy Extractor, New Applications of Differential Bounds of the SDS Structure, On Efficient Message Authentication Via Block Cipher Design Techniques, Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths, Perfectly Secure Message Transmission Against Independent Rational Adversaries, MMH: Software message authentication in the Gbit/second rates, Fast message authentication using efficient polynomial evaluation, MRD Hashing, Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications, EHE: NONCE MISUSE-RESISTANT MESSAGE AUTHENTICATION, On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes, Об одном семействе универсальных функций хеширования, QUANTUM KEY EVOLUTION AND ITS APPLICATIONS, Quantum Key Distribution, The security of the cipher block chaining message authentication code, MULTIPLE TRANSITIVITY AND MIN-WISE INDEPENDENCE IN PERMUTATION GROUPS, On the Computational Overhead of MPC with Dishonest Majority, A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY, Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms, On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles, Cryptography and Game Theory: Designing Protocols for Exchanging Information, Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker, Broadcast authentication for group communication, Polynomial hash functions are reliable, Optimal Las Vegas reduction from one-way set reconciliation to error correction, Efficient reliable communication over partially authenticated networks, Multilane HMAC— Security beyond the Birthday Limit, Tweakable Enciphering Schemes from Hash-Sum-Expansion, Новый режим аутентифицированного шифрования для произвольного блочного шифра на основе универсальной функции хэширования, Коды аутентификации с секретностью (обзор), RESPONSE TO "VULNERABILITY OF 'A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY'", VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY", Keyed hash functions, Security Bounds for Quantum Cryptography with Finite Resources, Quantum cryptography using any two nonorthogonal states, On the Security of Compressed Encodings, The Many Entropies in One-Way Functions, Quantum Authentication with Key Recycling, Attacks on quantum key distribution protocols that employ non-ITS authentication, Combinatorial techniques for universal hashing, Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3, Universal hashing and authentication codes, Variants of Wegman-Carter message authentication code supporting variable tag lengths, Randomized OBDD-based graph algorithms, Unconditionally secure quantum signatures, Counting distinct items over update streams, Towards tight security of cascaded LRW2, On modes of operations of a block cipher for authentication and authenticated encryption, FUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATION, Variationally universal hashing, An optimally fair coin toss, Authenticated QKD based on orthogonal states, Secret sharing schemes with partial broadcast channels, Incremental cryptography revisited: PRFs, nonces and modular design, Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system, Study on the security of the authentication scheme with key recycling in QKD, On the ring-LWE and polynomial-LWE problems, Optimal forgeries against polynomial-based MACs and GCM, Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds, Continuous-variable quantum identity authentication based on quantum teleportation, Experimental quantum cryptography., d-k-min-wise independent family of hash functions, A new multi-linear universal hash family, Instantiability of RSA-OAEP under chosen-plaintext attack, An improved scheme for set equality testing and updating, Comment on A practical protocol for three-party authenticated quantum key distribution, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, Connecting tweakable and multi-key blockcipher security, On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes, Improved asymmetric cipher based on matrix power function with provable security, Simple analysis of security of the BB84 quantum key distribution protocol, Efficient bit sifting scheme of post-processing in quantum key distribution, Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters, Improving classical authentication over a quantum channel, Logarithm Cartesian authentication codes., Hardness-preserving reductions via cuckoo hashing, Message authentication based on cryptographically secure CRC without polynomial irreducibility test, On weak keys and forgery attacks against polynomial-based MAC schemes, New proofs for NMAC and HMAC: security without collision resistance, On message authentication with a correlated setup, A trade-off between collision probability and key size in universal hashing using polynomials, Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security, KVaC: key-value commitments for blockchains and beyond, Improved security analysis for nonce-based enhanced hash-then-mask MACs, Packed multiplication: how to amortize the cost of side-channel masking?, Sublinear-space approximation algorithms for Max \(r\)-SAT, Entropy accumulation, On the existence of quantum signature for quantum messages, A complexity theory of efficient parallel algorithms, Asymmetric ``4+2 protocol for quantum key distribution with finite resources, Revisiting iterated attacks in the context of decorrelation theory, Non-cryptographic primitive for pseudorandom permutation., Certifying algorithms, Cache-oblivious hashing, Evaluating Bernstein-Rabin-Winograd polynomials, Quantum cryptography: public key distribution and coin tossing, Using quantum key distribution for cryptographic purposes: a survey, Key-leakage evaluation of authentication in quantum key distribution with finite resources, Direct proof of security of Wegman-Carter authentication with partially known key, Explicit and efficient hash families suffice for cuckoo hashing with a stash, A practical protocol for three-party authenticated quantum key distribution, A parallel tree difference algorithm, Low-congestion shortcut and graph parameters, On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers, Symmetric blind information reconciliation and hash-function-based verification for quantum key distribution, Authenticating ad hoc networks by comparison of short digests, Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector, The smooth entropy formalism for von Neumann algebras, The Case for Quantum Key Distribution, The circulant hash revisited, Breaking LWC candidates: sESTATE and Elephant in quantum setting, Analysis of the single-permutation encrypted Davies-Meyer construction, Two improved range-efficient algorithms for \(F_0\) estimation, Hierarchical sampling from sketches: Estimating functions over data streams, Quantum identity authentication based on ping-pong technique for photons, Mind the composition: birthday bound attacks on EWCDMD and SoKAC21, Efficient simulation of random states and random unitaries, Revisiting construction of online cipher in hash-ECB-hash structure, Efficient Threshold Encryption from Lossy Trapdoor Functions, A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys, Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers, EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC, Reliable communication over partially authenticated networks, Structure-preserving public-key encryption with leakage-resilient CCA security, Multi-user BBB security of public permutations based MAC, Generation of \(k\)-wise independent random variables with small randomness, MRD hashing., Qubit authentication, The summation-truncation hybrid: reusing discarded bits for free, Multireceiver authentication codes: Models, bounds, constructions, and extensions, Quantum identity authentication in the orthogonal-state-encoding QKD system, A short review on quantum identity authentication protocols: how would Bob know that he is talking with Alice?, Single-trace side-channel analysis on polynomial-based MAC schemes, Quantum key distribution using universal hash functions over finite fields, Controlled secure direct quantum communication inspired scheme for quantum identity authentication, Quantum identity authentication based on round robin differencial phase shift communication line, Scalable mechanisms for rational secret sharing, On the state of strength-three covering arrays
Cites Work