-
1
-
-
84958663551
-
Collision-resistant hashing: Towards making UOWHFs practical
-
B. Kaliski, editor, Proc. Crypto '97, Springer
-
M. Bellare and P. Rogaway. Collision-resistant hashing: Towards making UOWHFs practical. In B. Kaliski, editor, Proc. Crypto '97, volume 1294 of LNCS, pages 470-484. Springer, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84974696785
-
On families of hash functions via geometric codes and concatenation
-
D. Stinson, editor, Proc. Crypto '93, Springer
-
J. Bierbrauer, T. Johansson, G. Kabatianskii, and B. Smeets. On families of hash functions via geometric codes and concatenation. In D. Stinson, editor, Proc. Crypto '93, volume 773 of LNCS, pages 331-342. Springer, 1994.
-
(1994)
LNCS
, vol.773
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
5
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
M. Wiener, editor, Proc. Crypto '99. Springer
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In M. Wiener, editor, Proc. Crypto '99, volume 1666 of LNCS, pages 216-232. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 216-232
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
6
-
-
79959547406
-
The Rabbit stream cipher - Design and security analysis
-
ECRYPT Network of Excellence in Cryptography, October
-
M. Boesgaard, T. Pedersen, M. Vesterager, and E. Zenner. The Rabbit stream cipher - design and security analysis. In Workshop Record of the State of the Arts of Stream Ciphers Workshop, pages 7-29. ECRYPT Network of Excellence in Cryptography, October 2004.
-
(2004)
Workshop Record of the State of the Arts of Stream Ciphers Workshop
, pp. 7-29
-
-
Boesgaard, M.1
Pedersen, T.2
Vesterager, M.3
Zenner, E.4
-
7
-
-
0242571722
-
Rabbit: A new high-performance stream cipher
-
T. Johansson, editor, Proc. Fast Software Encryption 2003. Springer
-
M. Boesgaard, M. Vesterager, T. Pedersen, J. Christiansen, and O. Scavenius. Rabbit: A new high-performance stream cipher. In T. Johansson, editor, Proc. Fast Software Encryption 2003, volume 2887 of LNCS, pages 307-329. Springer, 2003.
-
(2003)
LNCS
, vol.2887
, pp. 307-329
-
-
Boesgaard, M.1
Vesterager, M.2
Pedersen, T.3
Christiansen, J.4
Scavenius, O.5
-
10
-
-
0003286492
-
The TLS protocol version 1.0
-
T. Dierks and C. Allen. The TLS protocol version 1.0, IETF RFC 2246. http://www.ietf.org/rfc.html, 1999.
-
(1999)
IETF RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
11
-
-
35248828702
-
A new version of the stream cipher SNOW
-
H. Heys and K. Nyberg, editors, Proc. SAC 2002, Springer
-
P. Ekdahl and T. Johansson. A new version of the stream cipher SNOW. In H. Heys and K. Nyberg, editors, Proc. SAC 2002, volume 2595 of LNCS, pages 47-61. Springer, 2002.
-
(2002)
LNCS
, vol.2595
, pp. 47-61
-
-
Ekdahl, P.1
Johansson, T.2
-
12
-
-
84942512232
-
Square Hash: Fast message authentication via optimized universal hash functions
-
M. Wiener, editor, Proc. Crypto '99, . Springer
-
M. Etzel, S. Patel, and Z. Ramzan. Square Hash: Fast message authentication via optimized universal hash functions. In M. Wiener, editor, Proc. Crypto '99, volume 1666 of LNCS, pages 234-251. Springer, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 234-251
-
-
Etzel, M.1
Patel, S.2
Ramzan, Z.3
-
14
-
-
0242571721
-
Helix: Fast encryption and authentication in a single cryptographic primitive
-
T. Johansson, editor, Proc. Fast Software Encryption 2003, Springer
-
N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, and T. Kohno. Helix: Fast encryption and authentication in a single cryptographic primitive. In T. Johansson, editor, Proc. Fast Software Encryption 2003, volume 2887 of LNCS, pages 330-346. Springer, 2003.
-
(2003)
LNCS
, vol.2887
, pp. 330-346
-
-
Ferguson, N.1
Whiting, D.2
Schneier, B.3
Kelsey, J.4
Lucks, S.5
Kohno, T.6
-
15
-
-
84942522751
-
MMH: Software message authentication in the Gbit/second rates
-
E. Biham, editor, Proc. Fast Software Encryption '97. Springer
-
S. Halevi and H. Krawczyk. MMH: Software message authentication in the Gbit/second rates. In E. Biham, editor, Proc. Fast Software Encryption '97, volume 1267 of LNCS, pages 172-189. Springer, 1997.
-
(1997)
LNCS
, vol.1267
, pp. 172-189
-
-
Halevi, S.1
Krawczyk, H.2
-
16
-
-
84991939136
-
LFSR-based hashing and authentication
-
Y. Desmedt, editor, Proc. Crypto '94, Berlin
-
H. Krawczyk. LFSR-based hashing and authentication. In Y. Desmedt, editor, Proc. Crypto '94, volume 839 of LNCS, pages 129-139, Berlin, 1994.
-
(1994)
LNCS
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
17
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication IETF RFC 2104. http://www.ietf.org/rfc.html, 1997.
-
(1997)
IETF RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
19
-
-
26444585952
-
-
T. Krovetz. UMAC performance. http://www.cs.ucdavis.edu/~rogaway/umac/ 2004/perf04.html, 2004.
-
(2004)
UMAC Performance
-
-
Krovetz, T.1
-
22
-
-
84957663269
-
Software performance of universal hash functions
-
J. Stern, editor, Proc. Eurocrypt '99, Springer
-
W. Nevelsteen and B. Preneel. Software performance of universal hash functions. In J. Stern, editor, Proc. Eurocrypt '99, volume 1592 of LNCS, pages 24-41. Springer, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 24-41
-
-
Nevelsteen, W.1
Preneel, B.2
-
23
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
D. Coppersmith, editor, Proc. Crypto '95. Springer
-
P. Rogaway. Bucket hashing and its application to fast message authentication. In D. Coppersmith, editor, Proc. Crypto '95, volume 963 of LNCS, pages 29-42. Springer, 1995.
-
(1995)
LNCS
, vol.963
, pp. 29-42
-
-
Rogaway, P.1
-
24
-
-
71049183202
-
Universal hashing and authentication codes
-
J. Feigenbaum, editor, Proc. Crypto '91, Springer
-
D. Stinson. Universal hashing and authentication codes. In J. Feigenbaum, editor, Proc. Crypto '91, volume 576 of LNCS, pages 74-85. Springer, 1992.
-
(1992)
LNCS
, vol.576
, pp. 74-85
-
-
Stinson, D.1
-
25
-
-
0000410707
-
Universal hashing and message authentication codes
-
D. Stinson. Universal hashing and message authentication codes. Designs, Codes, and Cryptography, 4(4):369-380, 1994.
-
(1994)
Designs, Codes, and Cryptography
, vol.4
, Issue.4
, pp. 369-380
-
-
Stinson, D.1
-
26
-
-
0842305624
-
On the connection between universal hashing, combinatorial designs and error-correcting codes
-
D. Stinson. On the connection between universal hashing, combinatorial designs and error-correcting codes. In Proc. Congressus Numerantium 114, pages 7-27, 1996.
-
(1996)
Proc. Congressus Numerantium
, vol.114
, pp. 7-27
-
-
Stinson, D.1
-
27
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegmann and J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegmann, M.1
Carter, J.2
|