scientific article; zbMATH DE number 1024067
From MaRDI portal
Publication:4341758
zbMath0870.94020MaRDI QIDQ4341758
Ben Smeets, Thomas Johansson, Grigory Kabatiansky, Juergen Bierbrauer
Publication date: 18 June 1997
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (22)
Attacks on quantum key distribution protocols that employ non-ITS authentication ⋮ Universal hashing and authentication codes ⋮ Universal Hashing and Multiple Authentication ⋮ Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings ⋮ Some constructions of systematic authentication codes using Galois rings ⋮ Optimal forgeries against polynomial-based MACs and GCM ⋮ A new multi-linear universal hash family ⋮ Connecting tweakable and multi-key blockcipher security ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ On weak keys and forgery attacks against polynomial-based MAC schemes ⋮ A trade-off between collision probability and key size in universal hashing using polynomials ⋮ Unnamed Item ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ Direct proof of security of Wegman-Carter authentication with partially known key ⋮ Fast message authentication using efficient polynomial evaluation ⋮ A coding theory construction of new systematic authentication codes ⋮ Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms ⋮ The circulant hash revisited ⋮ Key Agreement from Close Secrets over Unsecured Channels ⋮ Коды аутентификации с секретностью (обзор) ⋮ Tight security bounds for double-block hash-then-sum MACs ⋮ Quantum key distribution using universal hash functions over finite fields
This page was built for publication: