-
3
-
-
84954417747
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
M. Bellare, R. Guérin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. In Advances in Cryptology- Crypto '95, pages 15-28, 1995.
-
(1995)
Advances in Cryptology- Crypto '95
, pp. 15-28
-
-
Bellare, M.1
Guérin, R.2
Rogaway, P.3
-
6
-
-
0020913618
-
On computationally secure authentication tags requiring short secret shared keys
-
G. Brassard. On computationally secure authentication tags requiring short secret shared keys. In Advances in Cryptology-Crypto '82, pages 79-86, 1982.
-
(1982)
Advances in Cryptology-Crypto '82
, pp. 79-86
-
-
Brassard, G.1
-
7
-
-
0016038540
-
Codes which detect deception
-
E. Gilbert, F. M. Williams, and N. Sloane. Codes which detect deception. Bell System Technical Journal, 53(3):405-424, 1974.
-
(1974)
Bell System Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.1
Williams, F.M.2
Sloane, N.3
-
8
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput., 17:281-308, 1988.
-
(1988)
SIAM J. Comput
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
9
-
-
0017302550
-
Very simple method to find the minimal polynomial of an arbitrary non-zero element of a finite field
-
J. Gordon. Very simple method to find the minimal polynomial of an arbitrary non-zero element of a finite field. FAectronic Letters, 12:663-664, 1976.
-
(1976)
FAectronic Letters
, vol.12
, pp. 663-664
-
-
Gordon, J.1
-
14
-
-
84937740421
-
Shift-register synthesis and BCH coding
-
J. Massey. Shift-register synthesis and BCH coding. IEEE Trans. Inf. Theory, IT-15:122-127, 1969.
-
(1969)
IEEE Trans. Inf. Theory
, vol.IT-15
, pp. 122-127
-
-
Massey, J.1
-
15
-
-
0021470978
-
A compact algorithm for Gaussian elimination over GF(2) implemented on highly parallel computers
-
D. Parkinson and M. Wunderlich. A compact algorithm for Gaussian elimination over GF(2) implemented on highly parallel computers. Parallel Computing, pages 65-73, 1984.
-
(1984)
Parallel Computing
, pp. 65-73
-
-
Parkinson, D.1
Wunderlich, M.2
-
17
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
P. Rogaway. Bucket hashing and its application to fast message authentication. In Advances in Cryptology- Crypto '95, pages 29-42, 1995.
-
(1995)
Advances in Cryptology- Crypto '95
, pp. 29-42
-
-
Rogaway, P.1
-
18
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman and L. Carter. New hash functions and their use in authentication and set equality. J. of Computer and System Sciences, 22:265 -279, 1981.
-
(1981)
J. of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
-
19
-
-
0022583143
-
Solving sparse linear systems over finite fields
-
D. Wiedemann. Solving sparse linear systems over finite fields. IEEE Trans. Inf. Theory, IT-32:54- 62, 1986.
-
(1986)
IEEE Trans. Inf. Theory
, vol.IT-32
, pp. 54-62
-
-
Wiedemann, D.1
|