메뉴 건너뛰기




Volumn 4356 LNCS, Issue , 2007, Pages 327-341

Message authentication on 64-bit architectures

Author keywords

Architectural optimization; Message authentication; Universal hashing

Indexed keywords

ALGORITHMS; MESSAGE PASSING; OPTIMIZATION; PROGRAM PROCESSORS;

EID: 38149087416     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74462-7_23     Document Type: Conference Paper
Times cited : (26)

References (14)
  • 1
    • 21744457386 scopus 로고    scopus 로고
    • Afanassiev, V., Gehrmann, C., Smeets, B.: Fast message authentication using efficient polynomial evaluation. In: Biham, E. (ed.) FSE 1997. LNCS, 1267, pp. 190-204. Springer, Heidelberg (1997)
    • Afanassiev, V., Gehrmann, C., Smeets, B.: Fast message authentication using efficient polynomial evaluation. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 190-204. Springer, Heidelberg (1997)
  • 2
    • 24944476633 scopus 로고    scopus 로고
    • Stronger security bounds for Wegman-Carter-Shoup authenticators
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Bernstein, D.: Stronger security bounds for Wegman-Carter-Shoup authenticators. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 164-180. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 164-180
    • Bernstein, D.1
  • 3
    • 26444458893 scopus 로고    scopus 로고
    • Bernstein, D.: The Poly1305-AES message-authentication code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 32-49. Springer, Heidelberg (2005)
    • Bernstein, D.: The Poly1305-AES message-authentication code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 32-49. Springer, Heidelberg (2005)
  • 4
    • 84974696785 scopus 로고
    • On families of hash functions via geometric codes and concatenation
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Bierbrauer, J., Johansson, T., Kabatianskii, G., Smeets, B.: On families of hash functions via geometric codes and concatenation. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 331-342. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 331-342
    • Bierbrauer, J.1    Johansson, T.2    Kabatianskii, G.3    Smeets, B.4
  • 5
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
    • Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and secure message authentication. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 216-233. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 216-233
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 6
    • 26444459873 scopus 로고    scopus 로고
    • Boesgaard, M., Christensen, T., Badger, Z.E.: A fast and provably secure MAC. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 176-191. Springer, Heidelberg (2005)
    • Boesgaard, M., Christensen, T., Badger, Z.E.: A fast and provably secure MAC. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 176-191. Springer, Heidelberg (2005)
  • 8
    • 38149006463 scopus 로고    scopus 로고
    • Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to algorithms, Section 11.3.3. MIT Press, Cambridge (2001)
    • Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to algorithms, Section 11.3.3. MIT Press, Cambridge (2001)
  • 9
    • 84942522751 scopus 로고    scopus 로고
    • Halevi, S., Krawczyk, H.: MMH: Software message authentication in the Gbit/second rates. In: Biham, E. (ed.) FSE 1997. LNCS, 1267, pp. 172-189. Springer, Heidelberg (1997)
    • Halevi, S., Krawczyk, H.: MMH: Software message authentication in the Gbit/second rates. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 172-189. Springer, Heidelberg (1997)
  • 10
    • 0003294665 scopus 로고    scopus 로고
    • The Art of Computer Programming
    • 3rd edn, Addison-Wesley, Reading
    • Knuth, D.: The Art of Computer Programming. In: Seminumerical Algorithms, 3rd edn., vol. 2, pp. 486-489. Addison-Wesley, Reading (1998)
    • (1998) Seminumerical Algorithms , vol.2 , pp. 486-489
    • Knuth, D.1
  • 11
    • 18744385375 scopus 로고    scopus 로고
    • Fast universal hashing with small keys and no preprocessing: The PolyR construction
    • Springer, Heidelberg
    • Krovetz, T., Rogaway, P.: Fast universal hashing with small keys and no preprocessing: The PolyR construction. In: Information Security and Cryptology - ICICS 2000, pp. 73-89. Springer, Heidelberg (2000)
    • (2000) Information Security and Cryptology - ICICS , pp. 73-89
    • Krovetz, T.1    Rogaway, P.2
  • 12
    • 84942520895 scopus 로고    scopus 로고
    • On fast and provably secure message authentication based on universal hashing
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Shoup, V.: On fast and provably secure message authentication based on universal hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 313-328. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 313-328
    • Shoup, V.1
  • 13
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • Stinson, D.: Universal hashing and authentication codes. Designs, Codes and Cryptography 4, 369-380 (1994)
    • (1994) Designs, Codes and Cryptography , vol.4 , pp. 369-380
    • Stinson, D.1
  • 14
    • 38149080790 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M., Carter, L.: New hash functions and their use in authentication and set equality. J. of Computer and System Sciences 18, 143-154 (1979)
    • (1979) J. of Computer and System Sciences , vol.18 , pp. 143-154
    • Wegman, M.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.