Software performance of universal hash functions (1999)

Cached

Download Links

by Wim Nevelsteen , Bart Preneel
Venue:In Advances in Cryptology — EUROCRYPT ’99
Citations:26 - 0 self

Active Bibliography

28 Floating-Point Arithmetic And Message Authentication – Daniel J. Bernstein - 2000
67 On Fast and Provably Secure Message Authentication Based on Universal Hashing – Victor Shoup - 1996
28 On the security of two MAC algorithms – Bart Preneel, Paul C. Van Oorschot Y - 1996
2 A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices – Palash Sarkar
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
4 The chain sum primitive and its applications to MACs and stream ciphers – Mariusz Jakubowski, Ramarathnam Venkatesan - 1998
A method of Authentication for Quantum Networks – Stefan Rass
10 On the Round Security of Symmetric-Key Cryptographic Primitives – Zulfikar Ramzan, Leonid Reyzin - 2000
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
5 A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials – Palash Sarkar
5 Luby-Racko backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz - 1998
22 Luby-Rackoff backwards: Increasing security by making block ciphers non-invertible – Mihir Bellare, Ted Krovetz, Phillip Rogaway - 1998
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
Authentication protocols in pervasive computing – Nguyen Hoang Long
2 Security of Trusted Repeater Quantum Key Distribution Networks – Louis Salvail, Momtchil Peev, Eleni Diamanti, Romain Alléaume, Norbert Lütkenhaus, Thomas Länger - 2009
1 Key recycling in authentication – Christopher Portmann - 2012
44 CBC MAC for Real-Time Data Sources – Erez Petrank , Charles Rackoff - 1997
3 Message Authentication Codes – John R. Black - 2000