scientific article; zbMATH DE number 176541
From MaRDI portal
Publication:4035708
zbMATH Open0789.68050MaRDI QIDQ4035708FDOQ4035708
Authors: D. R. Stinson
Publication date: 18 May 1993
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Orthogonal arrays, Latin squares, Room squares (05B15)
Cited In (41)
- Коды аутентификации с секретностью (обзор)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Attacks on quantum key distribution protocols that employ non-ITS authentication
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- Non-repudiation without public-key
- Perennial secure multi-party computation of universal Turing machine
- Fuzzy universal hashing and approximate authentication
- The power of primes: security of authentication based on a universal hash-function family
- Variationally universal hashing
- Optimal forgeries against polynomial-based MACs and GCM
- Universal hash functions for an infinite universe and hash trees
- New hash functions and their use in authentication and set equality
- Sharp lower bounds on the extractable randomness from non-uniform sources
- Related-key almost universal hash functions: definitions, constructions and applications
- On privacy-preserving biometric authentication
- Title not available (Why is that?)
- Title not available (Why is that?)
- On fast and provably secure message authentication based on universal hashing
- Universal hash functions from exponential sums over finite fields and Galois rings
- Title not available (Why is that?)
- Short-output universal hash functions and their use in fast and secure data authentication
- Authenticating ad hoc networks by comparison of short digests
- Verifiable quantum key exchange with authentication
- Title not available (Why is that?)
- Keyed hash functions
- On a family of universal hash functions
- Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
- Universally composable anonymous hash certification model
- Using quantum key distribution for cryptographic purposes: a survey
- Direct proof of security of Wegman-Carter authentication with partially known key
- Revisiting construction of online cipher in hash-ECB-hash structure
- Title not available (Why is that?)
- New Universal Hash Functions
- Universal hash-function families: from hashing to authentication
- Combinatorial techniques for universal hashing
- A composition theorem for universal one-way hash functions
- Universal hashing and multiple authentication
- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
- Special properties of strongly universal\(_2\) hash functions important in quantum cryptography
- Strongly universal hashing and identification codes via channels
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4035708)