메뉴 건너뛰기




Volumn 1109, Issue , 1996, Pages 16-30

Universal hashing and multiple authentication

Author keywords

Authcntication code; Univcrsal hashing

Indexed keywords

AUTHENTICATION; CODES (SYMBOLS);

EID: 84955586754     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-68697-5_2     Document Type: Conference Paper
Times cited : (30)

References (17)
  • 3
    • 84974696785 scopus 로고
    • On families of hash functions via geometric codes and concatenation
    • D. R. Stinson ed., Lecture Notes m Computer Science
    • J. Bierbrauer, T. Johansson, G. Kabatianskii and B. Smeets, On families of hash functions via geometric codes and concatenation, in "Advances in Cryptology - CRYPTO '93," D. R. Stinson, ed., Lecture Notes m Computer Science 773 (1994), 331-342.
    • (1994) Advances in Cryptology - CRYPTO '93 , vol.773 , pp. 331-342
    • Bierbrauer, J.1    Johansson, T.2    Kabatianskii, G.3    Smeets, B.4
  • 4
    • 0013259203 scopus 로고
    • A simple and key-economical unconditional authentication scheme
    • B. den Boer, A simple and key-economical unconditional authentication scheme, Journal of Computer Security 2 (1993), 65-71.
    • (1993) Journal of Computer Security , vol.2 , pp. 65-71
    • den Boer, B.1
  • 6
    • 0038113323 scopus 로고    scopus 로고
    • Universal hash functions from exponential sums over finite fields and Galois rings
    • N. Koblitz ed, Lecture Notes in Computer Science
    • T. Helleseth and T. Johansson, Universal hash functions from exponential sums over finite fields and Galois rings, in "Advances in Cryptology - CR.YPTO '96," N. Koblitz, ed, Lecture Notes in Computer Science (1996).
    • (1996) Advances in Cryptology - CR.YPTO '96
    • Helleseth, T.1    Johansson, T.2
  • 7
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Y. G. Desmedt, ed., Lecture Notes in Computer Science
    • H. Krawczyk, LFSR-based hashing and authentication, in "Advances in Cryptology - CRYPTO '94," Y. G. Desmedt, ed., Lecture Notes in Computer Science 839 (1994), 129-139.
    • (1994) Advances in Cryptology - CRYPTO '94 , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 8
    • 84957367286 scopus 로고
    • New hash functions for message authentication
    • L. C. Guillou and J.-J. Quisquater, eds., Lecture Notes in Computer Science
    • H. Krawczyk, New hash functions for message authentication, in "Advances in Cryptology - EUROCRYPT '95," L. C, Guillou and J.-J. Quisquater, eds., Lecture Notes in Computer Science 921 (1995), 301-310.
    • (1995) Advances in Cryptology - EUROCRYPT '95 , vol.921 , pp. 301-310
    • Krawczyk, H.1
  • 9
    • 0022953155 scopus 로고
    • Cryptography - A selective survey
    • E. Biglieri and G. Prati, eds., North-Holland, [Also published in Alta Frequenza 55 (1986), 4-11.]
    • J. L. Massey, Cryptography - a selective survey, in "Digital Communications," E. Biglieri and G. Prati, eds., North-Holland, 1986, 3-21. [Also published in Alta Frequenza 55 (1986), 4-11.]
    • (1986) Digital Communications , pp. 3-21
    • Massey, J.L.1
  • 10
    • 84957645558 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • D. Coppersmith, ed., Lecture Notes in Computer Science
    • P. Rogaway, Bucket hashing and its application to fast message authentication, in "Advances in Cryptology CRYPTO '95," D. Coppersmith, ed., Lecture Notes in Computer Science 963 (1995), 29-42.
    • (1995) Advances in Cryptology CRYPTO '95 , vol.963 , pp. 29-42
    • Rogaway, P.1
  • 11
    • 0003038453 scopus 로고
    • A survey of information authentication
    • G. J. Simmons, ed., IEEE Press, [Preliminary version appeared in Proceedings of the IEEE 76 (1988), 603-620.]
    • G. J. Simmons, A survey of information authentication, in "Contemporary Cryptology, The Science of Information Integrity," G. J. Simmons, ed., IEEE Press, 1992, 379-419. [Preliminary version appeared in Proceedings of the IEEE 76 (1988), 603-620.]
    • (1992) Contemporary Cryptology, The Science of Information Integrity , pp. 379-419
    • Simmons, G.J.1
  • 12
    • 71049183202 scopus 로고
    • Universal hashing and authentication codes
    • J. Feigenbaum, Ed., Lecture Notes in Computer Science
    • D. R. Stinson, Universal hashing and authentication codes, in "Advances in Cryptology CRYPTO '91," J. Feigenbaum, Ed., Lecture Notes in Computer Science 576 (1992), 74-85.
    • (1992) Advances in Cryptology CRYPTO '91 , vol.576 , pp. 74-85
    • Stinson, D.R.1
  • 13
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes, Designs
    • D. R. Stinson, Universal hashing and authentication codes, Designs, Codes and Cryptography 4 (1994), 369-380.
    • (1994) Codes and Cryptography , vol.4 , pp. 369-380
    • Stinson, D.R.1
  • 14
    • 0842305624 scopus 로고    scopus 로고
    • On the connections between universal hashing, combinatorial designs and error-correcting codes
    • to appear in [Also appears in Electronic Colloquium on Computational Complexity, Report TR95-052.]
    • D. R. Stinson, On the connections between universal hashing, combinatorial designs and error-correcting codes, to appear in Congressus Numerantium 115 (1996). [Also appears in Electronic Colloquium on Computational Complexity, Report TR95-052.]
    • (1996) Congressus Numerantium 115
    • Stinson, D.R.1
  • 15
    • 84942520493 scopus 로고
    • Nearly optimal unconditionally secure authentication
    • A. De Santis, ed., Lecture Notes in Computer Science
    • R. Taylor, Nearly optimal unconditionally secure authentication, in "Advances in Cryptology - EUROCRYPT '94," A. De Santis, ed., Lecture Notes in Computer Science 950 (1995), 244-253.
    • (1995) Advances in Cryptology - EUROCRYPT '94 , vol.950 , pp. 244-253
    • Taylor, R.1
  • 16
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. N. Wegnian and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22 (1981), 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegnian, M.N.1    Carter, J.L.2
  • 17
    • 85029434541 scopus 로고
    • Sibling intractable function families and their applications
    • H. Imai, R. L. Rivest and T. Matsumoto, eds., Lecture Notes in Computer Science
    • Y. Zheng, T. Hardjono and J. Pieprzyk, Sibling intractable function families and their applications, in "Advances in Cryptology - ASIACRYPT '91," H. Imai, R. L. Rivest and T. Matsumoto, eds., Lecture Notes in Computer Science 739 (1993), 124-138.
    • (1993) Advances in Cryptology - ASIACRYPT '91 , vol.739 , pp. 124-138
    • Zheng, Y.1    Hardjono, T.2    Pieprzyk, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.