LFSR-based Hashing and Authentication
Top Cited Papers
- 13 July 2001
- book chapter
- Published by Springer Nature
- p. 129-139
- https://doi.org/10.1007/3-540-48658-5_15
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Simple construction of almost k-wise independent random variablesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Codes for Interactive AuthenticationPublished by Springer Nature ,2001
- On Families of Hash Functions via Geometric Codes and ConcatenationPublished by Springer Nature ,2001
- Unconditionally Secure Authentication Schemes and Practical and Theoretical ConsequencesPublished by Springer Nature ,2000
- A shift register construction of unconditionally secure authentication codesDesigns, Codes and Cryptography, 1994
- A programmable 800 Mbit/s CRC check/generator unit for LANs and MANsComputer Networks and ISDN Systems, 1992
- On Computationally Secure Authentication Tags Requiring Short Secret Shared KeysPublished by Springer Nature ,1983
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- Very simple method to find the minimum polynomial of an arbitrary nonzero element of a finite fieldElectronics Letters, 1976
- Codes Which Detect DeceptionBell System Technical Journal, 1974