Bucket Hashing and its Application to Fast Message Authentication
- 1 January 1995
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 19 references indexed in Scilit:
- Codes for Interactive AuthenticationPublished by Springer Nature ,2001
- On Families of Hash Functions via Geometric Codes and ConcatenationPublished by Springer Nature ,2001
- LFSR-based Hashing and AuthenticationPublished by Springer Nature ,2001
- Universal hashing and authentication codesDesigns, Codes and Cryptography, 1994
- Fast hashing of variable-length text stringsCommunications of the ACM, 1990
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- Graph Theory with ApplicationsPublished by Springer Nature ,1976