Bucket Hashing and its Application to Fast Message Authentication (1995)

by Phillip Rogaway
Citations:51 - 4 self

Documents Related by Co-Citation

119 LFSR-based hashing and authentication – H Krawczyk - 1994
144 The Security of Cipher Block Chaining – M. Bellare, J. Kilian, P. Rogaway - 1994
331 New Hash Functions and Their Use in Authentication and Set Equality – M N Wegman, J L Carter - 1981
67 On Fast and Provably Secure Message Authentication Based on Universal Hashing – Victor Shoup - 1996
669 Universal classes of hash functions – L Carter, M Wegman - 1979
122 XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions – Mihir Bellare, Roch Guérin, Phillip Rogaway - 1995
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
40 MMH: Software Message Authentication in the Gbit/second Rates – Shai Halevi, Hugo Krawczyk - 1997
625 How to Construct Random Functions – O Goldreich, S Goldwasser, S Micali - 1986
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
35 On computationally secure authentication tags requiring short secret shared keys.InD.Chaum,R.L.Rivest,andA.T.Sherman – G Brassard - 1983
106 Message Authentication with One-Way Hash Functions – Gene Tsudik - 1992
37 Fast Hashing on the Pentium – Antoon Bosselaers, René Govaerts, Joos Vandewalle, Joos V - 1996
281 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
827 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
78 MDx-MAC and Building Fast MACs from Hash Functions – Bart Preneel, Paul C. Van Oorschot - 1995
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
93 On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited – Moni Naor , Omer Reingold - 1997