메뉴 건너뛰기




Volumn 576 LNCS, Issue , 1992, Pages 74-85

Universal hashing and authentication codes

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; HASH FUNCTIONS;

EID: 71049183202     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-46766-1_5     Document Type: Conference Paper
Times cited : (94)

References (10)
  • 1
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. L Carter and M. N. Wegman. Universal classes of hash functions, J. Com-put. System Sci. 18 (1979), 143-154.
    • (1979) J. Com-put. System Sci , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 2
    • 0001131698 scopus 로고
    • The design of optimum multi-factorial experiments
    • R. L. Plackett and J. P. Burman. The design of optimum multi-factorial experiments, Biometrika 33 (1945), 305-325.
    • (1945) Biometrika , vol.33 , pp. 305-325
    • Plackett, R.L.1    Burman, J.P.2
  • 3
    • 33646740927 scopus 로고
    • A note on universal classes of hash functions
    • D. V. Sarwate. A note on universal classes of hash functions, Inform. Proc. Letters 10 (1980), 41-45.
    • (1980) Inform. Proc. Letters , vol.10 , pp. 41-45
    • Sarwate, D.V.1
  • 4
    • 0347818475 scopus 로고
    • Message authentication: A game on hypergraphs
    • G. J. Simmons. Message authentication: a game on hypergraphs, Congr. Numer. 45 (1984), 161-192.
    • (1984) Congr. Numer , vol.45 , pp. 161-192
    • Simmons, G.J.1
  • 5
    • 0024015453 scopus 로고
    • A survey of information authentication
    • G. J. Simmons. A survey of information authentication, Proc. of the IEEE 76 (1988), 603-620.
    • (1988) Proc. of the IEEE , vol.76 , pp. 603-620
    • Simmons, G.J.1
  • 6
    • 0023828936 scopus 로고
    • Some constructions and bounds for authentication codes
    • D. R. Stinson. Some constructions and bounds for authentication codes, J. Cryp-tology 1 (1988), 37-51.
    • (1988) J. Cryp-tology , vol.1 , pp. 37-51
    • Stinson, D.R.1
  • 7
    • 0025212061 scopus 로고
    • The combinatorics of authentication and secrecy codes
    • D. R. Stinson. The combinatorics of authentication and secrecy codes, J. Cryptology 2 (1990), 23-49.
    • (1990) J. Cryptology , vol.2 , pp. 23-49
    • Stinson, D.R.1
  • 8
    • 85024957935 scopus 로고    scopus 로고
    • Combinatorial techniques for universal hashing
    • submitted to
    • D. R. Stinson. Combinatorial techniques for universal hashing, submitted to J. Comput. System Sci.
    • J. Comput. System Sci
    • Stinson, D.R.1
  • 9
    • 85029539696 scopus 로고    scopus 로고
    • submitted to Designs, Codes and Cryptography (a preliminary version appears elsewhere in these proceedings)
    • D. R. Stinson. Combinatorial characterizations of authentication codes, submitted to Designs, Codes and Cryptography (a preliminary version appears elsewhere in these proceedings).
    • Combinatorial characterizations of authentication codes
    • Stinson, D.R.1
  • 10
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality, J. Comput. System Sci. 22 (1981), 265-279.
    • (1981) J. Comput. System Sci , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.