-
1
-
-
21744457386
-
Fast message authentication using effcient polynomial evaluation
-
Springer-Verlag
-
Afanassiev, V., Gehrmann, C., and Smeets, B. Fast message authentication using effcient polynomial evaluation. In Proceedings of the 4th Workshop on Fast Software Encryption. (1997), vol. 1267, Springer-Verlag, pp 190-204.
-
(1997)
Proceedings of the 4Th Workshop on Fast Software Encryption
, vol.1267
, pp. 190-204
-
-
Afanassiev, V.1
Gehrmann, C.2
Smeets, B.3
-
2
-
-
85056960014
-
American national standard - Financial institution message authentication (Wholesale)
-
Ansi X9.9
-
Ansi X9.9. American national standard - Financial institution message authentication (wholesale). ASC X9 Secretariat - American Bankers Association, 1986.
-
(1986)
ASC X9 Secretariat - American Bankers Association
-
-
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Bellare, M., Canetti, R., and Krawczyk, H. Keying hash functions for message authentication. In Advances in Cryptology - CRYPTO '96 (1996), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp 15.
-
(1996)
Advances in Cryptology - CRYPTO '96
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
0030416137
-
Pseudorandom functions revisited: The cascade construction
-
IEEE Computer Society
-
Bellare, M., Canetti, R., and Krawczyk, H. Pseudorandom functions revisited: The cascade construction. In 37th Annual Symposium on Foundations of Computer Science. (1996), IEEE Computer Society, pp 514-523.
-
(1996)
37Th Annual Symposium on Foundations of Computer Science
, pp. 514-523
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
84983089516
-
The security of cipher block chaining
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Bellare, M., Kilian, J., and Rogaway, P. The security of cipher block chaining. In Advances in Cryptology - CRYPTO '94. (1994), vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, pp 341-358.
-
(1994)
Advances in Cryptology - CRYPTO '94
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
7
-
-
34748827677
-
-
Unpublished specification
-
Black, J., Halevi, S., Hevia, A., Krawczyk, H., Krovetz, T., and Rogaway, P. UMAC - Message authentication code using universal hashing. Unpublished specification, www.cs.ucdavis.edu/~rogaway/umac, 1999.
-
(1999)
UMAC - Message Authentication Code Using Universal Hashing
-
-
Black, J.1
Halevi, S.2
Hevia, A.3
Krawczyk, H.4
Krovetz, T.5
Rogaway, P.6
-
8
-
-
0010020069
-
UMAC: Fast and secure message authentication
-
Lecture Notes in Computer Science, Springer-Verlag. Full version of this paper, available at
-
Black, J., Halevi, S., Krawczyk, H., Krovetz, T., and Rogaway, P. UMAC: Fast and secure message authentication. In Advances in Cryptology - CRYPTO '99. (1999), Lecture Notes in Computer Science, Springer-Verlag. Full version of this paper, available at www.cs.ucdavis.edu/~rogaway/umac.
-
(1999)
Advances in Cryptology - CRYPTO '99
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
9
-
-
0020913618
-
On computationally secure authentication tags requiring short secret shared keys
-
Springer-Verlag
-
Brassard, G. On computationally secure authentication tags requiring short secret shared keys. In Advances in Cryptology - CRYPTO '82. (1983), Springer-Verlag, pp 79-86.
-
(1983)
Advances in Cryptology - CRYPTO '82
, pp. 79-86
-
-
Brassard, G.1
-
11
-
-
0003629991
-
-
FIPS 180-1, NIST, US Dept. Of Commerce
-
FIPS 180-1. Secure hash standard. NIST, US Dept. Of Commerce, 1995.
-
(1995)
Secure Hash Standard
-
-
-
12
-
-
0003196107
-
HMAC: Keyed hashing for message authentication
-
H. Krawczyk, M. B., and Canetti, R. HMAC: Keyed hashing for message authentication. IETF RFC-2104, 1997.
-
(1997)
IETF RFC-2104
-
-
Krawczyk, H.M.B.1
Canetti, R.2
-
13
-
-
84942522751
-
MMH: Software message authentication in the Gbit/second rates
-
Springer-Verlag
-
Halevi, S., and Krawczyk, H. MMH: Software message authentication in the Gbit/second rates. In Proceedings of the 4th Workshop on Fast Software Encryption. (1997), vol. 1267, Springer-Verlag, pp 172-189.
-
(1997)
Proceedings of the 4Th Workshop on Fast Software Encryption
, vol.1267
, pp. 172-189
-
-
Halevi, S.1
Krawczyk, H.2
-
14
-
-
21744434823
-
Bucket hashing with small key size
-
Lecture Notes in Computer Science, Springer-Verlag
-
Johansson, T. Bucket hashing with small key size. In Advances in Cryptology - EUROCRYPT '97. (1997), Lecture Notes in Computer Science, Springer-Verlag.
-
(1997)
Advances in Cryptology - EUROCRYPT '97
-
-
Johansson, T.1
-
16
-
-
84991939136
-
LFSR-based hashing and authentication
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Krawczyk, H. LFSR-based hashing and authentication. In Advances in Cryptology - CRYPTO '94. (1994), vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, pp 129-139.
-
(1994)
Advances in Cryptology - CRYPTO '94
, vol.839
, pp. 129-139
-
-
Krawczyk, H.1
-
18
-
-
0025106672
-
The computational complexity of universal hashing
-
ACM Press
-
Mansour, Y., Nissan, N., and Tiwari, P. The computational complexity of universal hashing. In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing. (1990), ACM Press, pp 235-243.
-
(1990)
Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing
, pp. 235-243
-
-
Mansour, Y.1
Nissan, N.2
Tiwari, P.3
-
19
-
-
84957663269
-
Software performance of universal hash functions
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Nevelsteen, W., and Preneel, B. Software performance of universal hash functions. In Advances in Cryptology | EUROCRYPT '99 (1999), vol. 1592 of Lecture Notes in Computer Science, Springer-Verlag, pp 24-41.
-
(1999)
Advances in Cryptology | EUROCRYPT '99
, vol.1592
, pp. 24-41
-
-
Nevelsteen, W.1
Preneel, B.2
-
20
-
-
0012022743
-
Square hash: Fast message authentication via optimized universal hash functions
-
Lecture Notes in Computer Science, Springer-Verlag
-
Patel, S., and Ramzan, Z. Square hash: Fast message authentication via optimized universal hash functions. In Advances in Cryptology - CRYPTO '99 (1999), Lecture Notes in Computer Science, Springer-Verlag.
-
(1999)
Advances in Cryptology - CRYPTO '99
-
-
Patel, S.1
Ramzan, Z.2
-
22
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Preneel, B., and van Oorschot, P. MDx-MAC and building fast MACs from hash functions. In Advances in Cryptology - CRYPTO '95 (1995), vol. 963 of Lecture Notes in Computer Science, Springer-Verlag, pp 4.
-
(1995)
Advances in Cryptology - CRYPTO '95
, vol.963
-
-
Preneel, B.1
Van Oorschot, P.2
-
23
-
-
84947934697
-
On the security of two MAC algorithms
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Preneel, B., and van Oorschot, P. On the security of two MAC algorithms. In Advances in Cryptology - EUROCRYPT '96. (1996), vol. 1070 of Lecture Notes in Computer Science, Springer-Verlag, pp 19-32.
-
(1996)
Advances in Cryptology - EUROCRYPT '96
, vol.1070
, pp. 19-32
-
-
Preneel, B.1
Van Oorschot, P.2
-
24
-
-
0004102023
-
-
Available from
-
Rivest, R., Robshaw, M., Sidney, R., and Yin, Y. The RC6 block cipher. Available from http://theory.lcs.mit.edu/~rivest/publications.html, 1998.
-
(1998)
The RC6 Block Cipher
-
-
Rivest, R.1
Robshaw, M.2
Sidney, R.3
Yin, Y.4
-
25
-
-
0012086874
-
Bucket hashing and its application to fast message authentication
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Rogaway, P. Bucket hashing and its application to fast message authentication. In Advances in Cryptology - CRYPTO '95. (1995), vol. 963 of Lecture Notes in Computer Science, Springer-Verlag, pp 313-328.
-
(1995)
Advances in Cryptology - CRYPTO '95
, vol.963
, pp. 313-328
-
-
Rogaway, P.1
-
26
-
-
0003239571
-
On fast and provably secure message authentication based on universal hashing
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Shoup, V. On fast and provably secure message authentication based on universal hashing. In Advances in Cryptology - CRYPTO '96. (1996), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp 74-85.
-
(1996)
Advances in Cryptology - CRYPTO '96
, vol.1109
, pp. 74-85
-
-
Shoup, V.1
-
27
-
-
0026973508
-
Message authentication with one-way hash functions
-
IEEE Press
-
Tsudik, G. Message authentication with one-way hash functions. In Proceedings of Infocom '92. (1992), IEEE Press.
-
(1992)
Proceedings of Infocom '92
-
-
Tsudik, G.1
-
28
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M., and Carter, L. New hash functions and their use in authentication and set equality. In J. Of Comp. And System Sciences (1981), vol. 22, pp 265-279.
-
(1981)
In J. Of Comp. And System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
|