Universal hashing and authentication codes

From MaRDI portal
Publication:1335421

DOI10.1007/BF01388651zbMath0812.94011MaRDI QIDQ1335421

Douglas R. Stinson

Publication date: 20 May 1995

Published in: Designs, Codes and Cryptography (Search for Journal in Brave)




Related Items

Quantum readout of Physical Unclonable FunctionsAnalysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3Information-theoretic secret-key agreement: the asymptotically tight relation between the secret-key rate and the channel quality ratioUniversal Hashing and Multiple AuthenticationUniversal Hash Functions from Exponential Sums over Finite Fields and Galois RingsFUZZY UNIVERSAL HASHING AND APPROXIMATE AUTHENTICATIONVariationally universal hashingSome constructions of systematic authentication codes using Galois ringsStudy on the security of the authentication scheme with key recycling in QKDConstruction of orthogonal arraysA construction method for optimally universal hash families and its consequences for the existence of RBIBDsA new multi-linear universal hash familyUnnamed ItemOn one-round reliable message transmissionOn Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesOn the game-theoretical approach to the analysis of authentication codesEfficient bit sifting scheme of post-processing in quantum key distributionThe universality of iterated hashing over variable-length stringsMessage authentication based on cryptographically secure CRC without polynomial irreducibility testOn weak keys and forgery attacks against polynomial-based MAC schemesNew proofs for NMAC and HMAC: security without collision resistanceA trade-off between collision probability and key size in universal hashing using polynomialsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityOn Efficient Message Authentication Via Block Cipher Design TechniquesConcealment and Its Applications to Authenticated EncryptionMMH: Software message authentication in the Gbit/second ratesFast message authentication using efficient polynomial evaluationMRD HashingRIV for Robust Authenticated EncryptionОб одном семействе универсальных функций хешированияOn rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersAn effective greedy heuristic for the social golfer problemPractical unconditionally secure two-channel message authenticationModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorKey-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsSharp lower bounds on the extractable randomness from non-uniform sourcesA joint Shannon cipher and privacy amplification approach to attaining exponentially decaying information leakageMRD hashing.Multireceiver authentication codes: Models, bounds, constructions, and extensionsQuantum key distribution using universal hash functions over finite fieldsQuantum Authentication with Key RecyclingMosaics of combinatorial designs for information-theoretic security



Cites Work


This page was built for publication: Universal hashing and authentication codes