MMH: Software message authentication in the Gbit/second rates

From MaRDI portal
Publication:4639339

DOI10.1007/BFb0052345zbMath1385.94039MaRDI QIDQ4639339

Hugo Krawczyk, Shai Halevi

Publication date: 9 May 2018

Published in: Fast Software Encryption (Search for Journal in Brave)




Related Items

MMH* with arbitrary modulus is always almost-universalVariationally universal hashingIncremental cryptography revisited: PRFs, nonces and modular designOptimal forgeries against polynomial-based MACs and GCMA new multi-linear universal hash familyConnecting tweakable and multi-key blockcipher securityQuantum linearization attacksOn weak keys and forgery attacks against polynomial-based MAC schemesTweakable enciphering schemes using only the encryption function of a block cipherA trade-off between collision probability and key size in universal hashing using polynomialsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityOn Efficient Message Authentication Via Block Cipher Design TechniquesRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesОб одном семействе универсальных функций хешированияOn rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorKey-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsRevisiting construction of online cipher in hash-ECB-hash structureMMHBuilding Blockcipher from Tweakable Blockcipher: Extending FSE 2009 ProposalEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACQuantum key distribution using universal hash functions over finite fieldsAn efficient hybrid hash based privacy amplification algorithm for quantum key distribution



Cites Work