메뉴 건너뛰기




Volumn 1109, Issue , 1996, Pages 313-328

On fast and provably secure message authentication based on universal hashing

Author keywords

[No Author keywords available]

Indexed keywords

HASH FUNCTIONS;

EID: 84942520895     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68697-5_24     Document Type: Conference Paper
Times cited : (135)

References (19)
  • 3
    • 84954417747 scopus 로고
    • XOR MACs: New methods for message authentication using finite pseudorandom functions
    • M. Bellare, R. Guérin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. In Advances in Cryptology- Crypto '95, pages 15-28, 1995.
    • (1995) Advances in Cryptology- Crypto '95 , pp. 15-28
    • Bellare, M.1    Guérin, R.2    Rogaway, P.3
  • 6
    • 0020913618 scopus 로고
    • On computationally secure authentication tags requiring short secret shared keys
    • G. Brassard. On computationally secure authentication tags requiring short secret shared keys. In Advances in Cryptology-Crypto '82, pages 79-86, 1982.
    • (1982) Advances in Cryptology-Crypto '82 , pp. 79-86
    • Brassard, G.1
  • 8
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17:281-308, 1988.
    • (1988) SIAM J. Comput , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 9
    • 0017302550 scopus 로고
    • Very simple method to find the minimal polynomial of an arbitrary non-zero element of a finite field
    • J. Gordon. Very simple method to find the minimal polynomial of an arbitrary non-zero element of a finite field. FAectronic Letters, 12:663-664, 1976.
    • (1976) FAectronic Letters , vol.12 , pp. 663-664
    • Gordon, J.1
  • 14
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH coding
    • J. Massey. Shift-register synthesis and BCH coding. IEEE Trans. Inf. Theory, IT-15:122-127, 1969.
    • (1969) IEEE Trans. Inf. Theory , vol.IT-15 , pp. 122-127
    • Massey, J.1
  • 15
    • 0021470978 scopus 로고
    • A compact algorithm for Gaussian elimination over GF(2) implemented on highly parallel computers
    • D. Parkinson and M. Wunderlich. A compact algorithm for Gaussian elimination over GF(2) implemented on highly parallel computers. Parallel Computing, pages 65-73, 1984.
    • (1984) Parallel Computing , pp. 65-73
    • Parkinson, D.1    Wunderlich, M.2
  • 17
    • 84957645558 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • P. Rogaway. Bucket hashing and its application to fast message authentication. In Advances in Cryptology- Crypto '95, pages 29-42, 1995.
    • (1995) Advances in Cryptology- Crypto '95 , pp. 29-42
    • Rogaway, P.1
  • 18
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman and L. Carter. New hash functions and their use in authentication and set equality. J. of Computer and System Sciences, 22:265 -279, 1981.
    • (1981) J. of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, L.2
  • 19
    • 0022583143 scopus 로고
    • Solving sparse linear systems over finite fields
    • D. Wiedemann. Solving sparse linear systems over finite fields. IEEE Trans. Inf. Theory, IT-32:54- 62, 1986.
    • (1986) IEEE Trans. Inf. Theory , vol.IT-32 , pp. 54-62
    • Wiedemann, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.