XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
- 1 January 1995
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Incremental cryptography and application to virus protectionPublished by Association for Computing Machinery (ACM) ,1995
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- Message authentication with one-way hash functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1992
- Simulating (log/sup c/n)-wise independence in NCPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1989
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- A fast and simple randomized parallel algorithm for the maximal independent set problemJournal of Algorithms, 1986
- How to construct random functionsJournal of the ACM, 1986