2.3. PERFECT CONFIDENTIALITY OF MULTI-S01 CIPHER........................................................................... 6 (2001)

Cached

Download Links

by Unknown Authors

Active Bibliography

3 Message Authentication Codes – John R. Black - 2000
2 A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices – Palash Sarkar
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
28 Floating-Point Arithmetic And Message Authentication – Daniel J. Bernstein - 2000
On the construction of digest functions for manual authentication protocols – n.n.
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
1 Variationally Universal Hashing – Ted Krovetz, Phillip Rogaway - 2006
5 A Trade-Off Between Collision Probability and Key Size in Universal Hashing Using Polynomials – Palash Sarkar
Modes of Operations for Encryption and Authentication Using Stream Ciphers Supporting an Initialisation Vector – Palash Sarkar
8 Fast universal hashing with small keys and no preprocessing: the PolyR construction – Ted Krovetz, Phillip Rogaway - 2000
4 The chain sum primitive and its applications to MACs and stream ciphers – Mariusz Jakubowski, Ramarathnam Venkatesan - 1998
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
10 Recent Developments in the Design of Conventional Cryptographic Algorithms – Bart Preneel, Vincent Rijmen, Antoon Bosselaers - 1998
3 A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security ⋆ – Ueli Maurer, Johan Sjödin
4 Statistical Cryptanalysis of Block Ciphers – Pascal Junod - 2004
2 Analysis of the Collision Resistance of RadioGatún using Algebraic Techniques – Charles Bouillaguet, Pierre-alain Fouque
7 Energy Scalable Universal Hashing – Jens-Peter Kaps, Kaan Yüksel, Berk Sunar - 2004
Authentication protocols in pervasive computing – Nguyen Hoang Long