scientific article; zbMATH DE number 176541
From MaRDI portal
Publication:4035708
Recommendations
Cited in
(41)- Коды аутентификации с секретностью (обзор)
- Attacks on quantum key distribution protocols that employ non-ITS authentication
- scientific article; zbMATH DE number 1676651 (Why is no real title available?)
- scientific article; zbMATH DE number 1406775 (Why is no real title available?)
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- Perennial secure multi-party computation of universal Turing machine
- Non-repudiation without public-key
- Variationally universal hashing
- Fuzzy universal hashing and approximate authentication
- The power of primes: security of authentication based on a universal hash-function family
- Universal hash functions for an infinite universe and hash trees
- Optimal forgeries against polynomial-based MACs and GCM
- New hash functions and their use in authentication and set equality
- Sharp lower bounds on the extractable randomness from non-uniform sources
- Related-key almost universal hash functions: definitions, constructions and applications
- On privacy-preserving biometric authentication
- scientific article; zbMATH DE number 1676656 (Why is no real title available?)
- scientific article; zbMATH DE number 177611 (Why is no real title available?)
- On fast and provably secure message authentication based on universal hashing
- Universal hash functions from exponential sums over finite fields and Galois rings
- scientific article; zbMATH DE number 5027117 (Why is no real title available?)
- Authenticating ad hoc networks by comparison of short digests
- Short-output universal hash functions and their use in fast and secure data authentication
- Verifiable quantum key exchange with authentication
- scientific article; zbMATH DE number 1951607 (Why is no real title available?)
- Keyed hash functions
- On a family of universal hash functions
- Using quantum key distribution for cryptographic purposes: a survey
- Direct proof of security of Wegman-Carter authentication with partially known key
- Universally composable anonymous hash certification model
- Revisiting construction of online cipher in hash-ECB-hash structure
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- scientific article; zbMATH DE number 1676652 (Why is no real title available?)
- New Universal Hash Functions
- Combinatorial techniques for universal hashing
- Universal hash-function families: from hashing to authentication
- A composition theorem for universal one-way hash functions
- Universal hashing and multiple authentication
- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
- Special properties of strongly universal\(_2\) hash functions important in quantum cryptography
- Strongly universal hashing and identification codes via channels
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4035708)