MDx-MAC and Building Fast MACs from Hash Functions
- 1 January 1995
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- The Security of Cipher Block ChainingPublished by Springer Nature ,2001
- LFSR-based Hashing and AuthenticationPublished by Springer Nature ,2001
- A Design Principle for Hash FunctionsPublished by Springer Nature ,2001
- A Message Authenticator Algorithm Suitable for a Mainframe ComputerPublished by Springer Nature ,2000
- Collisions for the compression function of MD5Published by Springer Nature ,1994
- Message authentication with one-way hash functionsACM SIGCOMM Computer Communication Review, 1992
- Computer losses in 1988 - A reviewComputer Law & Security Review, 1989
- Solutions to the multidestination secure electronic mail problemComputers & Security, 1988
- A cryptographic checksum for integrity protectionComputers & Security, 1987
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981