-
1
-
-
0025535378
-
Simple constructions of almost k-wise independent random variables
-
October
-
Noga Alon, Oded Goldreich, Johan Hastad, and Rene Peralta. Simple constructions of almost k-wise independent random variables. In 31th Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, pages 544-553, October 1990.
-
(1990)
31Th Annual Symposium on Foundations of Computer Science, St. Louis, Missouri
, pp. 544-553
-
-
Alon, N.1
Goldreich, O.2
Hastad, J.3
Peralta, R.4
-
2
-
-
84974696785
-
On Families of Hash Functions via Geometric Codes and Concatenation
-
Bierbrauer J., Johansson T., Kabatianskii G., and Smeets, B., “On Families of Hash Functions via Geometric Codes and Concatenation”, Proc. of Crypto’93, pp. 331-342.
-
Proc. of Crypto’93
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
3
-
-
38249014097
-
A programmable 800 Mbit/s CRC check/generator unit for LANs and MANs
-
Birch, J., Christensen, L.G., and Skov, M., “A programmable 800 Mbit/s CRC check/generator unit for LANs and MANs”, Comp. Networks and ISDN Sys., 1992.
-
(1992)
Comp. Networks and ISDN Sys
-
-
Birch, J.1
Christensen, L.G.2
Skov, M.3
-
4
-
-
0020913618
-
On computationally secure authentication tags requiring short secret shared keys
-
Brassard, G., “On computationally secure authentication tags requiring short secret shared keys”, Proc. of Crypto’82, pp.79-86.
-
Proc. of Crypto’82
, pp. 79-86
-
-
Brassard, G.1
-
5
-
-
0018456171
-
Universal Classes of Hash Functions
-
Carter, J.L. and Wegman, M.N., “Universal Classes of Hash Functions”, JCSS, 18, 1979, pp. 143-154.
-
(1979)
JCSS
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
6
-
-
85028773348
-
Unconditionally secure authentication schemes and practical and theoretical consequences
-
Desmedt, Y., “Unconditionally secure authentication schemes and practical and theoretical consequences”, Proc. of Crypto’ 85, pp.42-55.
-
Proc. of Crypto’
, vol.85
, pp. 42-55
-
-
Desmedt, Y.1
-
7
-
-
1842705061
-
Codes for Interactive Authentication
-
Gemmell, P., and Naor, M., “Codes for Interactive Authentication”, Proc. of Crypto’ 93, pp. 355-367.
-
Proc. of Crypto’
, vol.93
, pp. 355-367
-
-
Gemmell, P.1
Naor, M.2
-
8
-
-
0016038540
-
-
Gilbert, E.N., MacWilliams, F.J., and Sloane, N.J.A., “Codes which detect deception”, Bell Syst. Tech. J., Vol. 53, 1974, pp. 405-424.
-
(1974)
“Codes Which Detect deception”, Bell Syst. Tech. J.
, vol.53
, pp. 405-424
-
-
Gilbert, E.N.1
Macwilliams, F.J.2
Sloane, N.J.A.3
-
9
-
-
0017302550
-
Very simple method to find the minimal polynomial of an arbitrary non-zero element of a finite field
-
John A Gordon, “Very simple method to find the minimal polynomial of an arbitrary non-zero element of a finite field”, Electronics Letters, Vol. 12, 1976, pp. 663-664.
-
(1976)
Electronics Letters
, vol.12
, pp. 663-664
-
-
Gordon, J.A.1
-
10
-
-
12944287001
-
A Shift Register Construction of Unconditionally Secure Authentication Codes
-
Johansson T., “A Shift Register Construction of Unconditionally Secure Authentication Codes”, Design, Codes and Cryptography, 4, 1994, pp. 69-81.
-
(1994)
Design, Codes and Cryptography
, vol.4
, pp. 69-81
-
-
Johansson, T.1
-
11
-
-
0346810208
-
On the Relation Between A-Codes and Codes Correcting Independent Errors
-
Johansson T., Kabatianskii G., and Smeets, B., “On the Relation Between A-Codes and Codes Correcting Independent Errors”, Proc. of Eurocrypt’ 93, pp. 1-11.
-
Proc. of Eurocrypt’
, vol.93
, pp. 1-11
-
-
Johansson, T.1
Kabatianskii, G.2
Smeets, B.3
-
12
-
-
84985822896
-
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers
-
Lai, X., Rueppel, R.A., and Woollven, J., “A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers”, Auscrypt’ 92, pp. 339-348.
-
Auscrypt’
, vol.92
, pp. 339-348
-
-
Lai, X.1
Rueppel, R.A.2
Woollven, J.3
-
13
-
-
0001936794
-
Finite Fields
-
Reading, MA: Addison-Wesley
-
Lidl, R., and Niederreiter, H., “Finite Fields”, in Encyclopedia of Mathematics and Its Applications, Vol. 20, Reading, MA: Addison-Wesley, 1983.
-
(1983)
Encyclopedia of Mathematics and Its Applications
, vol.20
-
-
Lidl, R.1
Niederreiter, H.2
-
14
-
-
0025106672
-
The Computational Complexity of Universal Hashing
-
Mansour, Y., Nisan, N., and Tiwari, P., “The Computational Complexity of Universal Hashing”, STOC’ 90, pp. 235-243.
-
STOC’
, vol.90
, pp. 235-243
-
-
Mansour, Y.1
Nisan, N.2
Tiwari, P.3
-
16
-
-
0003676885
-
-
Tech. Rep. TR-15-81, Center for Research in Computing Technology, Harvard Univ., Cambridge, Mass
-
Rabin, M.O., “Fingerprinting by Random Polynomials”, Tech. Rep. TR-15-81, Center for Research in Computing Technology, Harvard Univ., Cambridge, Mass., 1981.
-
(1981)
“Fingerprinting by Random Polynomials
-
-
Rabin, M.O.1
-
17
-
-
84983269168
-
Authentication theory/coding theory
-
Simmons, G.J., “Authentication theory/coding theory”, Proc. of Crypto’ 84, 411-431.
-
Proc. of Crypto’ 84
, pp. 411-431
-
-
Simmons, G.J.1
-
18
-
-
0003038453
-
A Survey of Information Authentication
-
in Gustavos J. Simmons, editor, The Science of Information, IEEE Press
-
Simmons, G.J., “A Survey of Information Authentication”, in Gustavos J. Simmons, editor, Contemporary Cryptology, The Science of Information, IEEE Press, 1992.
-
(1992)
Contemporary Cryptology
-
-
Simmons, G.J.1
-
19
-
-
0344818561
-
Universal hashing and authentication codes
-
Stinson, D.R., “Universal hashing and authentication codes”, Proc. of Crypto’ 91, pp. 74-85.
-
Proc. of Crypto’
, vol.91
, pp. 74-85
-
-
Stinson, D.R.1
-
20
-
-
85041062628
-
An integrity check value algorithm for stream ciphers
-
Taylor, R., “An integrity check value algorithm for stream ciphers”, Proc. of Crypto’93, pp. 40-48.
-
Proc. of Crypto’93
, pp. 40-48
-
-
Taylor, R.1
-
21
-
-
0019572642
-
New Hash Functions and Their Use in Authentication and Set Equality
-
Wegman, M.N., and Carter, J.L., “New Hash Functions and Their Use in Authentication and Set Equality”, JCSS, 22, 1981, pp. 265-279.
-
(1981)
JCSS
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|