Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication
- 1 January 2012
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 18 references indexed in Scilit:
- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1Lecture Notes in Computer Science, 2009
- Key-Recovery Attacks on Universal Hash Function Based MAC AlgorithmsLecture Notes in Computer Science, 2008
- Efficient Mutual Data Authentication Using Manually Authenticated StringsLecture Notes in Computer Science, 2006
- Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR ConstructionLecture Notes in Computer Science, 2001
- UMAC: Fast and Secure Message AuthenticationLecture Notes in Computer Science, 1999
- Square Hash: Fast Message Authentication via Optimized Universal Hash FunctionsLecture Notes in Computer Science, 1999
- A Reliable Randomized Algorithm for the Closest-Pair ProblemJournal of Algorithms, 1997
- MMH: Software message authentication in the Gbit/second ratesLecture Notes in Computer Science, 1997
- New Hash Functions for Message AuthenticationLecture Notes in Computer Science, 1995
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979