Bucket hashing and its application to fast message authentication
From MaRDI portal
Publication:1291805
DOI10.1007/PL00003822zbMath0937.94011OpenAlexW2022640260MaRDI QIDQ1291805
Publication date: 6 June 2000
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/pl00003822
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (7)
Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 ⋮ A construction method for optimally universal hash families and its consequences for the existence of RBIBDs ⋮ A new multi-linear universal hash family ⋮ Tight security of cascaded LRW2 ⋮ The universality of iterated hashing over variable-length strings ⋮ A trade-off between collision probability and key size in universal hashing using polynomials ⋮ The circulant hash revisited
This page was built for publication: Bucket hashing and its application to fast message authentication