Square Hash: Fast Message Authentication via Optimized Universal Hash Functions (1999)

by Mark Etzel , Sarvar Patel , Zulfikar Ramzan
Venue:In Proc. CRYPTO 99, Lecture Notes in Computer Science
Citations:21 - 6 self

Active Bibliography

51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
3 Message Authentication Codes – John R. Black - 2000
4 The chain sum primitive and its applications to MACs and stream ciphers – Mariusz Jakubowski, Ramarathnam Venkatesan - 1998
67 On Fast and Provably Secure Message Authentication Based on Universal Hashing – Victor Shoup - 1996
10 On the Round Security of Symmetric-Key Cryptographic Primitives – Zulfikar Ramzan, Leonid Reyzin - 2000
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
44 CBC MAC for Real-Time Data Sources – Erez Petrank , Charles Rackoff - 1997
40 MMH: Software Message Authentication in the Gbit/second Rates – Shai Halevi, Hugo Krawczyk - 1997
19 From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs – Moni Naor, Omer Reingold - 1998
2 A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices – Palash Sarkar
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
3 Proposal to NIST for a parallelizable message authentication code – Phillip Rogaway, John Black - 2001
1 Key recycling in authentication – Christopher Portmann - 2012
28 Floating-Point Arithmetic And Message Authentication – Daniel J. Bernstein - 2000
1 New Constructions of Universal Hash Functions based on Function Sums – Khoongming Khoo, Swee-huay Heng
8 Fast universal hashing with small keys and no preprocessing: the PolyR construction – Ted Krovetz, Phillip Rogaway - 2000
3 A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security ⋆ – Ueli Maurer, Johan Sjödin
A method of Authentication for Quantum Networks – Stefan Rass