Sciweavers

208 search results - page 3 / 42
» Variationally universal hashing
Sort
View
CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
14 years 2 months ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
AAECC
2008
Springer
101views Algorithms» more  AAECC 2008»
13 years 11 months ago
In search of mathematical primitives for deriving universal projective hash families
We provide some guidelines for deriving new projective hash families of cryptographic interest. Our main building blocks are so called group action systems; we explore what propert...
Maria Isabel Gonzalez Vasco, Jorge Luis Villar
STOC
2003
ACM
178views Algorithms» more  STOC 2003»
14 years 11 months ago
Uniform hashing in constant time and linear space
Many algorithms and data structures employing hashing have been analyzed under the uniform hashing assumption, i.e., the assumption that hash functions behave like truly random fu...
Anna Östlin, Rasmus Pagh
AAECC
1990
Springer
100views Algorithms» more  AAECC 1990»
14 years 2 months ago
Duality between Two Cryptographic Primitives
This paper reveals a duality between constructions of two basic cryptographic primitives, pseudo-random string generators and one-way hash functions. Applying the duality, we pres...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai