On Fast and Provably Secure Message Authentication Based on Universal Hashing (1996)

Cached

Download Links

by Victor Shoup
Venue:In Advances in Cryptology – CRYPTO ’96
Citations:67 - 0 self

Documents Related by Co-Citation

119 LFSR-based hashing and authentication – H Krawczyk - 1994
331 New Hash Functions and Their Use in Authentication and Set Equality – M N Wegman, J L Carter - 1981
51 Bucket Hashing and its Application to Fast Message Authentication – Phillip Rogaway - 1995
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
281 How to construct pseudorandom permutations from pseudorandom functions – M Luby, C Rackoff - 1988
144 The Security of Cipher Block Chaining – M. Bellare, J. Kilian, P. Rogaway - 1994
35 On computationally secure authentication tags requiring short secret shared keys.InD.Chaum,R.L.Rivest,andA.T.Sherman – G Brassard - 1983
625 How to Construct Random Functions – O Goldreich, S Goldwasser, S Micali - 1986
669 Universal classes of hash functions – L Carter, M Wegman - 1979
40 MMH: Software Message Authentication in the Gbit/second Rates – Shai Halevi, Hugo Krawczyk - 1997
122 XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions – Mihir Bellare, Roch Guérin, Phillip Rogaway - 1995
193 The Security of the Cipher Block Chaining Message Authentication Code – Mihir Bellare, Joe Kilian , Phillip Rogaway - 2000
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
58 Codes which detect deception – Edgar N Gilbert, F Jessie MacWilliams, Neil J A Sloane - 1974
45 On families of hash functions via geometric codes and concatenation – J Bierbrauer, T Johansson, G Kabatianskii, B Smeets - 1994
10 Bucket Hashing with a Small Key Size – Thomas Johansson - 1997
28 Floating-Point Arithmetic And Message Authentication – Daniel J. Bernstein - 2000
15 Smeets B. Fast message authentication using efficient polynomial evaluation – V Afanassiev, C Gehrmann - 1997
351 A Concrete Security Treatment of Symmetric Encryption – M. Bellare, A. Desai, E. Jokipii, P. Rogaway - 1997