-
2
-
-
84961739729
-
-
Revision 1.0 December 7
-
D. Balenson, D. Carman, M. Heyman, and A. Sherman, "Adaptive Cryptographically Synchronized Authentication (ACSA): Model and analysis," Revision 1.0 (December 7, 1998). 53pages.
-
(1998)
Adaptive Cryptographically Synchronized Authentication (ACSA): Model and Analysis
-
-
Balenson, D.1
Carman, D.2
Heyman, M.3
Sherman, A.4
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
Advances in Cryptology: Proceedings of CRYPTO '96, N. Koblitz, ed., Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication" in Advances in Cryptology: Proceedings of CRYPTO '96, LNCS 1109, N. Koblitz, ed., Springer-Verlag (1996), 1-15.
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Advances in Cryptology: Proceedings of CRYPTO '99, M. Wiener, ed., Springer-Verlag
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, "UMAC: Fast and secure message authentication" in Advances in Cryptology: Proceedings of CRYPTO '99, LNCS 1666, M. Wiener, ed., Springer-Verlag (1999), 216-233.
-
(1999)
LNCS
, vol.1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
6
-
-
84961736182
-
-
Revision 1.0 May 12
-
D. Carman, J. Adcock, D. Balenson, M. Heyman, and A. Sherman, "Adaptive Cryptographically Synchronized Authentication (ACSA): Prototype system design," Revision 1.0 (May 12, 1999). 56pages.
-
(1999)
Adaptive Cryptographically Synchronized Authentication (ACSA): Prototype System Design
-
-
Carman, D.1
Adcock, J.2
Balenson, D.3
Heyman, M.4
Sherman, A.5
-
7
-
-
84961739736
-
-
Web Page
-
DARPA ITO ACSA Web Page, http://www.darpa.mil/ito/psum1998/G374-0.html.
-
-
-
-
8
-
-
84942512232
-
Square hash: Fast message authentication via optimized universal hash functions
-
Advances in Cryptology: Proceedings of CRYPTO '99, M. Wiener, ed., Springer-Verlag
-
M. Etzel, S. Patel, Z. Ramzan, "Square hash: Fast message authentication via optimized universal hash functions," in Advances in Cryptology: Proceedings of CRYPTO '99, LNCS 1666, M. Wiener, ed., Springer-Verlag (1999), 234-251.
-
(1999)
LNCS
, vol.1666
, pp. 234-251
-
-
Etzel, M.1
Patel, S.2
Ramzan, Z.3
-
9
-
-
0010227320
-
Integrity-aware PCBC encryption schemes
-
Security Protocols - 7th International Workshop, B. Chrisianson, B. Crispo, and M. Roe, ed., Cambridge, U.K., Springer-Verlag April
-
V. Gligor, and P. Donescu, "Integrity-aware PCBC encryption schemes," Security Protocols - 7th International Workshop, LNCS, B. Chrisianson, B. Crispo, and M. Roe, ed., Cambridge, U.K., Springer-Verlag (April 1999).
-
(1999)
LNCS
-
-
Gligor, V.1
Donescu, P.2
-
10
-
-
84942522751
-
MMH: Software message authentication in the Gbit/second rates
-
Fast Software Encryption, Eli Biham, ed., Springer-Verlag
-
S. Halevi and H. Krawczyk, "MMH: Software message authentication in the Gbit/second rates" in Fast Software Encryption, LNCS 1233, Eli Biham, ed., Springer-Verlag (1997), 172-189.
-
(1997)
LNCS
, vol.1233
, pp. 172-189
-
-
Halevi, S.1
Krawczyk, H.2
-
17
-
-
84863128746
-
Suggestions for random number generation
-
January 22
-
T. Matthews, "Suggestions for random number generation," RSA Laboratries' Bulletin, No. 1 (January 22, 1996). 4 pages. http://www.rsa.com/rsalabs/html/bulletins.html.
-
(1996)
RSA Laboratries' Bulletin
, Issue.1
-
-
Matthews, T.1
-
18
-
-
84912566969
-
-
Technical Report Dept. Computer Science, University of Arizona
-
E. Nahum, S. O'Malley, H. Orman, and R. Schroeppel, "Towards high performance cryptographic software," Technical Report TR95-04, Dept. Computer Science, University of Arizona (1995).
-
(1995)
Towards High Performance Cryptographic Software
-
-
Nahum, E.1
O'Malley, S.2
Orman, H.3
Schroeppel, R.4
-
19
-
-
84957645558
-
Bucket hashing and its application to fast message authentication
-
Advances in Cryptology: Proceedings of CRYPTO '95, D. Coppersmith, ed., Springer-Verlag
-
P. Rogaway, "Bucket hashing and its application to fast message authentication" in Advances in Cryptology: Proceedings of CRYPTO '95, LNCS 963, D. Coppersmith, ed., Springer-Verlag (1995), 313-328.
-
(1995)
LNCS
, vol.963
, pp. 313-328
-
-
Rogaway, P.1
-
21
-
-
33746021717
-
Bucket hashing and its application to fast message authentication
-
Spring
-
P. Rogaway, "Bucket hashing and its application to fast message authentication," Journal of Cryptology, Vol. 12, No. 2 (Spring 1999).
-
(1999)
Journal of Cryptology
, vol.12
, Issue.2
-
-
Rogaway, P.1
-
22
-
-
84942520895
-
On fast and provably secure message authentication based on universal hashing
-
Advances in Cryptology: Proceedings of CRYPTO '96, N. Koblitz, ed., Springer-Verlag
-
V. Shoup, "On fast and provably secure message authentication based on universal hashing," Advances in Cryptology: Proceedings of CRYPTO '96, LNCS 1109, N. Koblitz, ed., Springer-Verlag (1996), 74-85.
-
(1996)
LNCS
, vol.1109
, pp. 74-85
-
-
Shoup, V.1
-
23
-
-
0043028736
-
-
RFC 1810 June
-
J. Touch, "Report on MD5 performance," RFC 1810 (June 1995). 7 pages. http://www.isi.edu/touch/pubs/rfc1810.html.
-
(1995)
Report on MD5 Performance
-
-
Touch, J.1
-
24
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman and L. Carter, "New hash functions and their use in authentication and set equality," Journal of Computer and System Sciences, Vol. 22 (1981), 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
|