scientific article; zbMATH DE number 1406775
From MaRDI portal
Publication:4940691
zbMath0939.94567MaRDI QIDQ4940691
Publication date: 1 March 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
hash functionslinear feedback shift registerssecure authenticationcyclic redundancy codesToeplitz hashing
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (46)
Attacks on quantum key distribution protocols that employ non-ITS authentication ⋮ Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 ⋮ Universal Hashing and Multiple Authentication ⋮ Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings ⋮ On Fast and Provably Secure Message Authentication Based on Universal Hashing ⋮ Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes ⋮ A new multi-linear universal hash family ⋮ On-line ciphers and the Hash-CBC constructions ⋮ On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes ⋮ Tight security of cascaded LRW2 ⋮ Improving classical authentication over a quantum channel ⋮ The universality of iterated hashing over variable-length strings ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ Message authentication based on cryptographically secure CRC without polynomial irreducibility test ⋮ Better security-efficiency trade-offs in permutation-based two-party computation ⋮ Categorization of faulty nonce misuse resistant message authentication ⋮ On weak keys and forgery attacks against polynomial-based MAC schemes ⋮ Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security ⋮ Towards closing the security gap of Tweak-aNd-Tweak (TNT) ⋮ On Privacy-Preserving Biometric Authentication ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ Key-leakage evaluation of authentication in quantum key distribution with finite resources ⋮ Direct proof of security of Wegman-Carter authentication with partially known key ⋮ MMH: Software message authentication in the Gbit/second rates ⋮ MRD Hashing ⋮ RIV for Robust Authenticated Encryption ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes ⋮ Authenticating ad hoc networks by comparison of short digests ⋮ Practical unconditionally secure two-channel message authentication ⋮ Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms ⋮ The circulant hash revisited ⋮ Precise evaluation of leaked information with secure randomness extraction in the presence of quantum attacker ⋮ : Increasing the Security and Efficiency of ⋮ Online Ciphers from Tweakable Blockciphers ⋮ An Integrated ECC-MAC Based on RS Code ⋮ Encryption modes with almost free message integrity ⋮ Input-Oblivious Proof Systems and a Uniform Complexity Perspective on P/poly ⋮ EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC ⋮ The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3 ⋮ Reliable communication over partially authenticated networks ⋮ Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC ⋮ MRD hashing. ⋮ A new post-quantum voting protocol based on physical laws ⋮ Limits of the Cryptographic Realization of Dolev-Yao-Style XOR ⋮ Quantum key distribution using universal hash functions over finite fields
This page was built for publication: