메뉴 건너뛰기




Volumn 839 LNCS, Issue , 1994, Pages 129-139

LFSR-based hashing and authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; HASH FUNCTIONS; PUBLIC KEY CRYPTOGRAPHY;

EID: 84991939136     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48658-5_15     Document Type: Conference Paper
Times cited : (368)

References (21)
  • 3
  • 4
    • 0020913618 scopus 로고    scopus 로고
    • On computationally secure authentication tags requiring short secret shared keys
    • Brassard, G., “On computationally secure authentication tags requiring short secret shared keys”, Proc. of Crypto’82, pp.79-86.
    • Proc. of Crypto’82 , pp. 79-86
    • Brassard, G.1
  • 5
    • 0018456171 scopus 로고
    • Universal Classes of Hash Functions
    • Carter, J.L. and Wegman, M.N., “Universal Classes of Hash Functions”, JCSS, 18, 1979, pp. 143-154.
    • (1979) JCSS , vol.18 , pp. 143-154
    • Carter, J.L.1    Wegman, M.N.2
  • 6
    • 85028773348 scopus 로고    scopus 로고
    • Unconditionally secure authentication schemes and practical and theoretical consequences
    • Desmedt, Y., “Unconditionally secure authentication schemes and practical and theoretical consequences”, Proc. of Crypto’ 85, pp.42-55.
    • Proc. of Crypto’ , vol.85 , pp. 42-55
    • Desmedt, Y.1
  • 7
    • 1842705061 scopus 로고    scopus 로고
    • Codes for Interactive Authentication
    • Gemmell, P., and Naor, M., “Codes for Interactive Authentication”, Proc. of Crypto’ 93, pp. 355-367.
    • Proc. of Crypto’ , vol.93 , pp. 355-367
    • Gemmell, P.1    Naor, M.2
  • 9
    • 0017302550 scopus 로고
    • Very simple method to find the minimal polynomial of an arbitrary non-zero element of a finite field
    • John A Gordon, “Very simple method to find the minimal polynomial of an arbitrary non-zero element of a finite field”, Electronics Letters, Vol. 12, 1976, pp. 663-664.
    • (1976) Electronics Letters , vol.12 , pp. 663-664
    • Gordon, J.A.1
  • 10
    • 12944287001 scopus 로고
    • A Shift Register Construction of Unconditionally Secure Authentication Codes
    • Johansson T., “A Shift Register Construction of Unconditionally Secure Authentication Codes”, Design, Codes and Cryptography, 4, 1994, pp. 69-81.
    • (1994) Design, Codes and Cryptography , vol.4 , pp. 69-81
    • Johansson, T.1
  • 11
    • 0346810208 scopus 로고    scopus 로고
    • On the Relation Between A-Codes and Codes Correcting Independent Errors
    • Johansson T., Kabatianskii G., and Smeets, B., “On the Relation Between A-Codes and Codes Correcting Independent Errors”, Proc. of Eurocrypt’ 93, pp. 1-11.
    • Proc. of Eurocrypt’ , vol.93 , pp. 1-11
    • Johansson, T.1    Kabatianskii, G.2    Smeets, B.3
  • 12
    • 84985822896 scopus 로고    scopus 로고
    • A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers
    • Lai, X., Rueppel, R.A., and Woollven, J., “A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers”, Auscrypt’ 92, pp. 339-348.
    • Auscrypt’ , vol.92 , pp. 339-348
    • Lai, X.1    Rueppel, R.A.2    Woollven, J.3
  • 14
    • 0025106672 scopus 로고    scopus 로고
    • The Computational Complexity of Universal Hashing
    • Mansour, Y., Nisan, N., and Tiwari, P., “The Computational Complexity of Universal Hashing”, STOC’ 90, pp. 235-243.
    • STOC’ , vol.90 , pp. 235-243
    • Mansour, Y.1    Nisan, N.2    Tiwari, P.3
  • 16
    • 0003676885 scopus 로고
    • Tech. Rep. TR-15-81, Center for Research in Computing Technology, Harvard Univ., Cambridge, Mass
    • Rabin, M.O., “Fingerprinting by Random Polynomials”, Tech. Rep. TR-15-81, Center for Research in Computing Technology, Harvard Univ., Cambridge, Mass., 1981.
    • (1981) “Fingerprinting by Random Polynomials
    • Rabin, M.O.1
  • 17
    • 84983269168 scopus 로고    scopus 로고
    • Authentication theory/coding theory
    • Simmons, G.J., “Authentication theory/coding theory”, Proc. of Crypto’ 84, 411-431.
    • Proc. of Crypto’ 84 , pp. 411-431
    • Simmons, G.J.1
  • 18
    • 0003038453 scopus 로고
    • A Survey of Information Authentication
    • in Gustavos J. Simmons, editor, The Science of Information, IEEE Press
    • Simmons, G.J., “A Survey of Information Authentication”, in Gustavos J. Simmons, editor, Contemporary Cryptology, The Science of Information, IEEE Press, 1992.
    • (1992) Contemporary Cryptology
    • Simmons, G.J.1
  • 19
    • 0344818561 scopus 로고    scopus 로고
    • Universal hashing and authentication codes
    • Stinson, D.R., “Universal hashing and authentication codes”, Proc. of Crypto’ 91, pp. 74-85.
    • Proc. of Crypto’ , vol.91 , pp. 74-85
    • Stinson, D.R.1
  • 20
    • 85041062628 scopus 로고    scopus 로고
    • An integrity check value algorithm for stream ciphers
    • Taylor, R., “An integrity check value algorithm for stream ciphers”, Proc. of Crypto’93, pp. 40-48.
    • Proc. of Crypto’93 , pp. 40-48
    • Taylor, R.1
  • 21
    • 0019572642 scopus 로고
    • New Hash Functions and Their Use in Authentication and Set Equality
    • Wegman, M.N., and Carter, J.L., “New Hash Functions and Their Use in Authentication and Set Equality”, JCSS, 22, 1981, pp. 265-279.
    • (1981) JCSS , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.