Keyed hash functions
- 1 January 1996
- book chapter
- Published by Springer Nature
- p. 201-214
- https://doi.org/10.1007/bfb0032359
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Universal Hashing and Unconditional Authentication CodesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Authentication Theory/Coding TheoryPublished by Springer Nature ,2000
- Combinatorial structure of A-codes with r-fold securityPublished by Springer Nature ,1995
- Linear nonequivalence versus nonlinearityPublished by Springer Nature ,1993
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979