-
3
-
-
84974696785
-
On families of hash functions via geometric codes and concatenation
-
D. R. Stinson ed., Lecture Notes m Computer Science
-
J. Bierbrauer, T. Johansson, G. Kabatianskii and B. Smeets, On families of hash functions via geometric codes and concatenation, in "Advances in Cryptology - CRYPTO '93," D. R. Stinson, ed., Lecture Notes m Computer Science 773 (1994), 331-342.
-
(1994)
Advances in Cryptology - CRYPTO '93
, vol.773
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
4
-
-
0013259203
-
A simple and key-economical unconditional authentication scheme
-
B. den Boer, A simple and key-economical unconditional authentication scheme, Journal of Computer Security 2 (1993), 65-71.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 65-71
-
-
den Boer, B.1
-
6
-
-
0038113323
-
Universal hash functions from exponential sums over finite fields and Galois rings
-
N. Koblitz ed, Lecture Notes in Computer Science
-
T. Helleseth and T. Johansson, Universal hash functions from exponential sums over finite fields and Galois rings, in "Advances in Cryptology - CR.YPTO '96," N. Koblitz, ed, Lecture Notes in Computer Science (1996).
-
(1996)
Advances in Cryptology - CR.YPTO '96
-
-
Helleseth, T.1
Johansson, T.2
-
7
-
-
84991939136
-
LFSR-based hashing and authentication
-
Y. G. Desmedt, ed., Lecture Notes in Computer Science
-
H. Krawczyk, LFSR-based hashing and authentication, in "Advances in Cryptology - CRYPTO '94," Y. G. Desmedt, ed., Lecture Notes in Computer Science 839 (1994), 129-139.
-
(1994)
Advances in Cryptology - CRYPTO '94
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
8
-
-
84957367286
-
New hash functions for message authentication
-
L. C. Guillou and J.-J. Quisquater, eds., Lecture Notes in Computer Science
-
H. Krawczyk, New hash functions for message authentication, in "Advances in Cryptology - EUROCRYPT '95," L. C, Guillou and J.-J. Quisquater, eds., Lecture Notes in Computer Science 921 (1995), 301-310.
-
(1995)
Advances in Cryptology - EUROCRYPT '95
, vol.921
, pp. 301-310
-
-
Krawczyk, H.1
-
9
-
-
0022953155
-
Cryptography - A selective survey
-
E. Biglieri and G. Prati, eds., North-Holland, [Also published in Alta Frequenza 55 (1986), 4-11.]
-
J. L. Massey, Cryptography - a selective survey, in "Digital Communications," E. Biglieri and G. Prati, eds., North-Holland, 1986, 3-21. [Also published in Alta Frequenza 55 (1986), 4-11.]
-
(1986)
Digital Communications
, pp. 3-21
-
-
Massey, J.L.1
-
10
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
D. Coppersmith, ed., Lecture Notes in Computer Science
-
P. Rogaway, Bucket hashing and its application to fast message authentication, in "Advances in Cryptology CRYPTO '95," D. Coppersmith, ed., Lecture Notes in Computer Science 963 (1995), 29-42.
-
(1995)
Advances in Cryptology CRYPTO '95
, vol.963
, pp. 29-42
-
-
Rogaway, P.1
-
11
-
-
0003038453
-
A survey of information authentication
-
G. J. Simmons, ed., IEEE Press, [Preliminary version appeared in Proceedings of the IEEE 76 (1988), 603-620.]
-
G. J. Simmons, A survey of information authentication, in "Contemporary Cryptology, The Science of Information Integrity," G. J. Simmons, ed., IEEE Press, 1992, 379-419. [Preliminary version appeared in Proceedings of the IEEE 76 (1988), 603-620.]
-
(1992)
Contemporary Cryptology, The Science of Information Integrity
, pp. 379-419
-
-
Simmons, G.J.1
-
12
-
-
71049183202
-
Universal hashing and authentication codes
-
J. Feigenbaum, Ed., Lecture Notes in Computer Science
-
D. R. Stinson, Universal hashing and authentication codes, in "Advances in Cryptology CRYPTO '91," J. Feigenbaum, Ed., Lecture Notes in Computer Science 576 (1992), 74-85.
-
(1992)
Advances in Cryptology CRYPTO '91
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
13
-
-
0000410707
-
Universal hashing and authentication codes, Designs
-
D. R. Stinson, Universal hashing and authentication codes, Designs, Codes and Cryptography 4 (1994), 369-380.
-
(1994)
Codes and Cryptography
, vol.4
, pp. 369-380
-
-
Stinson, D.R.1
-
14
-
-
0842305624
-
On the connections between universal hashing, combinatorial designs and error-correcting codes
-
to appear in [Also appears in Electronic Colloquium on Computational Complexity, Report TR95-052.]
-
D. R. Stinson, On the connections between universal hashing, combinatorial designs and error-correcting codes, to appear in Congressus Numerantium 115 (1996). [Also appears in Electronic Colloquium on Computational Complexity, Report TR95-052.]
-
(1996)
Congressus Numerantium 115
-
-
Stinson, D.R.1
-
15
-
-
84942520493
-
Nearly optimal unconditionally secure authentication
-
A. De Santis, ed., Lecture Notes in Computer Science
-
R. Taylor, Nearly optimal unconditionally secure authentication, in "Advances in Cryptology - EUROCRYPT '94," A. De Santis, ed., Lecture Notes in Computer Science 950 (1995), 244-253.
-
(1995)
Advances in Cryptology - EUROCRYPT '94
, vol.950
, pp. 244-253
-
-
Taylor, R.1
-
16
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegnian and J. L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22 (1981), 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegnian, M.N.1
Carter, J.L.2
-
17
-
-
85029434541
-
Sibling intractable function families and their applications
-
H. Imai, R. L. Rivest and T. Matsumoto, eds., Lecture Notes in Computer Science
-
Y. Zheng, T. Hardjono and J. Pieprzyk, Sibling intractable function families and their applications, in "Advances in Cryptology - ASIACRYPT '91," H. Imai, R. L. Rivest and T. Matsumoto, eds., Lecture Notes in Computer Science 739 (1993), 124-138.
-
(1993)
Advances in Cryptology - ASIACRYPT '91
, vol.739
, pp. 124-138
-
-
Zheng, Y.1
Hardjono, T.2
Pieprzyk, J.3
|