-
1
-
-
21744457386
-
-
Afanassiev, V., Gehrmann, C., Smeets, B.: Fast message authentication using efficient polynomial evaluation. In: Biham, E. (ed.) FSE 1997. LNCS, 1267, pp. 190-204. Springer, Heidelberg (1997)
-
Afanassiev, V., Gehrmann, C., Smeets, B.: Fast message authentication using efficient polynomial evaluation. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 190-204. Springer, Heidelberg (1997)
-
-
-
-
2
-
-
24944476633
-
Stronger security bounds for Wegman-Carter-Shoup authenticators
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Bernstein, D.: Stronger security bounds for Wegman-Carter-Shoup authenticators. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 164-180. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 164-180
-
-
Bernstein, D.1
-
3
-
-
26444458893
-
-
Bernstein, D.: The Poly1305-AES message-authentication code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 32-49. Springer, Heidelberg (2005)
-
Bernstein, D.: The Poly1305-AES message-authentication code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 32-49. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
84974696785
-
On families of hash functions via geometric codes and concatenation
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bierbrauer, J., Johansson, T., Kabatianskii, G., Smeets, B.: On families of hash functions via geometric codes and concatenation. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 331-342. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
5
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and secure message authentication. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 216-233. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
6
-
-
26444459873
-
-
Boesgaard, M., Christensen, T., Badger, Z.E.: A fast and provably secure MAC. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 176-191. Springer, Heidelberg (2005)
-
Boesgaard, M., Christensen, T., Badger, Z.E.: A fast and provably secure MAC. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 176-191. Springer, Heidelberg (2005)
-
-
-
-
8
-
-
38149006463
-
-
Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to algorithms, Section 11.3.3. MIT Press, Cambridge (2001)
-
Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to algorithms, Section 11.3.3. MIT Press, Cambridge (2001)
-
-
-
-
9
-
-
84942522751
-
-
Halevi, S., Krawczyk, H.: MMH: Software message authentication in the Gbit/second rates. In: Biham, E. (ed.) FSE 1997. LNCS, 1267, pp. 172-189. Springer, Heidelberg (1997)
-
Halevi, S., Krawczyk, H.: MMH: Software message authentication in the Gbit/second rates. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 172-189. Springer, Heidelberg (1997)
-
-
-
-
10
-
-
0003294665
-
The Art of Computer Programming
-
3rd edn, Addison-Wesley, Reading
-
Knuth, D.: The Art of Computer Programming. In: Seminumerical Algorithms, 3rd edn., vol. 2, pp. 486-489. Addison-Wesley, Reading (1998)
-
(1998)
Seminumerical Algorithms
, vol.2
, pp. 486-489
-
-
Knuth, D.1
-
11
-
-
18744385375
-
Fast universal hashing with small keys and no preprocessing: The PolyR construction
-
Springer, Heidelberg
-
Krovetz, T., Rogaway, P.: Fast universal hashing with small keys and no preprocessing: The PolyR construction. In: Information Security and Cryptology - ICICS 2000, pp. 73-89. Springer, Heidelberg (2000)
-
(2000)
Information Security and Cryptology - ICICS
, pp. 73-89
-
-
Krovetz, T.1
Rogaway, P.2
-
12
-
-
84942520895
-
On fast and provably secure message authentication based on universal hashing
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Shoup, V.: On fast and provably secure message authentication based on universal hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 313-328. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 313-328
-
-
Shoup, V.1
-
13
-
-
0000410707
-
Universal hashing and authentication codes
-
Stinson, D.: Universal hashing and authentication codes. Designs, Codes and Cryptography 4, 369-380 (1994)
-
(1994)
Designs, Codes and Cryptography
, vol.4
, pp. 369-380
-
-
Stinson, D.1
-
14
-
-
38149080790
-
New hash functions and their use in authentication and set equality
-
Wegman, M., Carter, L.: New hash functions and their use in authentication and set equality. J. of Computer and System Sciences 18, 143-154 (1979)
-
(1979)
J. of Computer and System Sciences
, vol.18
, pp. 143-154
-
-
Wegman, M.1
Carter, L.2
|