Sciweavers

66 search results - page 1 / 14
» Universal Hashing and Authentication Codes
Sort
View
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
14 years 2 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
14 years 2 months ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
FSE
1997
Springer
246views Cryptology» more  FSE 1997»
14 years 2 months ago
Fast Message Authentication Using Efficient Polynomial Evaluation
Abstract. Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexit...
Valentine Afanassiev, Christian Gehrmann, Ben J. M...
FPGA
2004
ACM
121views FPGA» more  FPGA 2004»
14 years 4 months ago
Divide and concatenate: a scalable hardware architecture for universal MAC
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
Bo Yang, Ramesh Karri, David A. McGrew
JUCS
2008
144views more  JUCS 2008»
13 years 11 months ago
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Abstract: Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial
Christian Rechberger, Vincent Rijmen