메뉴 건너뛰기




Volumn 1, Issue , 2000, Pages 127-139

Trading off strength and performance in network authentication: Experience with the ACSA project

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMMERCE; HIGH SPEED NETWORKS;

EID: 84961710277     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2000.824971     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Advances in Cryptology: Proceedings of CRYPTO '96, N. Koblitz, ed., Springer-Verlag
    • M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication" in Advances in Cryptology: Proceedings of CRYPTO '96, LNCS 1109, N. Koblitz, ed., Springer-Verlag (1996), 1-15.
    • (1996) LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 84957068240 scopus 로고    scopus 로고
    • UMAC: Fast and secure message authentication
    • Advances in Cryptology: Proceedings of CRYPTO '99, M. Wiener, ed., Springer-Verlag
    • J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway, "UMAC: Fast and secure message authentication" in Advances in Cryptology: Proceedings of CRYPTO '99, LNCS 1666, M. Wiener, ed., Springer-Verlag (1999), 216-233.
    • (1999) LNCS , vol.1666 , pp. 216-233
    • Black, J.1    Halevi, S.2    Krawczyk, H.3    Krovetz, T.4    Rogaway, P.5
  • 7
    • 84961739736 scopus 로고    scopus 로고
    • Web Page
    • DARPA ITO ACSA Web Page, http://www.darpa.mil/ito/psum1998/G374-0.html.
  • 8
    • 84942512232 scopus 로고    scopus 로고
    • Square hash: Fast message authentication via optimized universal hash functions
    • Advances in Cryptology: Proceedings of CRYPTO '99, M. Wiener, ed., Springer-Verlag
    • M. Etzel, S. Patel, Z. Ramzan, "Square hash: Fast message authentication via optimized universal hash functions," in Advances in Cryptology: Proceedings of CRYPTO '99, LNCS 1666, M. Wiener, ed., Springer-Verlag (1999), 234-251.
    • (1999) LNCS , vol.1666 , pp. 234-251
    • Etzel, M.1    Patel, S.2    Ramzan, Z.3
  • 9
    • 0010227320 scopus 로고    scopus 로고
    • Integrity-aware PCBC encryption schemes
    • Security Protocols - 7th International Workshop, B. Chrisianson, B. Crispo, and M. Roe, ed., Cambridge, U.K., Springer-Verlag April
    • V. Gligor, and P. Donescu, "Integrity-aware PCBC encryption schemes," Security Protocols - 7th International Workshop, LNCS, B. Chrisianson, B. Crispo, and M. Roe, ed., Cambridge, U.K., Springer-Verlag (April 1999).
    • (1999) LNCS
    • Gligor, V.1    Donescu, P.2
  • 10
    • 84942522751 scopus 로고    scopus 로고
    • MMH: Software message authentication in the Gbit/second rates
    • Fast Software Encryption, Eli Biham, ed., Springer-Verlag
    • S. Halevi and H. Krawczyk, "MMH: Software message authentication in the Gbit/second rates" in Fast Software Encryption, LNCS 1233, Eli Biham, ed., Springer-Verlag (1997), 172-189.
    • (1997) LNCS , vol.1233 , pp. 172-189
    • Halevi, S.1    Krawczyk, H.2
  • 17
    • 84863128746 scopus 로고    scopus 로고
    • Suggestions for random number generation
    • January 22
    • T. Matthews, "Suggestions for random number generation," RSA Laboratries' Bulletin, No. 1 (January 22, 1996). 4 pages. http://www.rsa.com/rsalabs/html/bulletins.html.
    • (1996) RSA Laboratries' Bulletin , Issue.1
    • Matthews, T.1
  • 19
    • 84957645558 scopus 로고
    • Bucket hashing and its application to fast message authentication
    • Advances in Cryptology: Proceedings of CRYPTO '95, D. Coppersmith, ed., Springer-Verlag
    • P. Rogaway, "Bucket hashing and its application to fast message authentication" in Advances in Cryptology: Proceedings of CRYPTO '95, LNCS 963, D. Coppersmith, ed., Springer-Verlag (1995), 313-328.
    • (1995) LNCS , vol.963 , pp. 313-328
    • Rogaway, P.1
  • 21
    • 33746021717 scopus 로고    scopus 로고
    • Bucket hashing and its application to fast message authentication
    • Spring
    • P. Rogaway, "Bucket hashing and its application to fast message authentication," Journal of Cryptology, Vol. 12, No. 2 (Spring 1999).
    • (1999) Journal of Cryptology , vol.12 , Issue.2
    • Rogaway, P.1
  • 22
    • 84942520895 scopus 로고    scopus 로고
    • On fast and provably secure message authentication based on universal hashing
    • Advances in Cryptology: Proceedings of CRYPTO '96, N. Koblitz, ed., Springer-Verlag
    • V. Shoup, "On fast and provably secure message authentication based on universal hashing," Advances in Cryptology: Proceedings of CRYPTO '96, LNCS 1109, N. Koblitz, ed., Springer-Verlag (1996), 74-85.
    • (1996) LNCS , vol.1109 , pp. 74-85
    • Shoup, V.1
  • 23
    • 0043028736 scopus 로고
    • RFC 1810 June
    • J. Touch, "Report on MD5 performance," RFC 1810 (June 1995). 7 pages. http://www.isi.edu/touch/pubs/rfc1810.html.
    • (1995) Report on MD5 Performance
    • Touch, J.1
  • 24
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman and L. Carter, "New hash functions and their use in authentication and set equality," Journal of Computer and System Sciences, Vol. 22 (1981), 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.