Bucket Hashing with a Small Key Size (1997)

Cached

Download Links

by Thomas Johansson
Venue:In Advances in Cryptology – EUROCRYPT ’97 (1997), Lecture Notes in Computer Science
Citations:10 - 0 self

Active Bibliography

26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
111 UMAC: Fast and Secure Message Authentication – J. Black, S. Halevi, H. Krawczyk, T. Krovetz, P. Rogaway - 1999
40 MMH: Software Message Authentication in the Gbit/second Rates – Shai Halevi, Hugo Krawczyk - 1997
2 On Computation of Polynomial Modular Reduction – Huapeng Wu, Key Word - 2000
4 Message authentication on 64-bit architectures – Ted Krovetz - 2006
8 Fast universal hashing with small keys and no preprocessing: the PolyR construction – Ted Krovetz, Phillip Rogaway - 2000
37 The Poly1305-AES message-authentication code – Daniel J. Bernstein - 2005
Textbook: Introduction to Cryptography with – Sandeep Kumar
On the Compression of Cryptographic Keys – Aldar C-f. Chan - 712
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-Keying Techniques – Mihir Bellarey - 2001
Abstract Private Matching – J. D. Tygar, Joseph M. Hellerstein, Yaping Li, J. D. Tygar - 2004
Building the Big Message Authentication Code – Dale R. Thompson, J. Brad Maxwell, James P. Parkerson
Office Hours: TBA – Muneeb Ali, Zartash Afzal Uzmi, Ta(s) Tashfeen Suleman - 2004
SRDP: Securing Route Discovery in DSR – unknown authors
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths – Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee
Examining Misimplemented RSA and Strengthened Authentication for Variations of the Cryptovirological Information Extortion Attack 1 The Counter-Attack – Justin Troutman - 2005
Cryptanalysis of Symmetric Block Ciphers – Kungl Tekniska Högskolan, Computer Science, Gustaf Dellkrantz, Supervisor K. U, Leuven Christophe, De Cannière, Breaking Reduced Khazad
3.2 Implementing Signcryption with Shortened Signature............. 12 – Yuliang Zheng - 1999
A preliminary version appears in TCC, Lecture Notes in Computer Science, Springer-Verlag, 2008. Multi-Property Preserving Combiners – For Hash Functions, Marc Fischlin, Anja Lehmann