MMH: Software message authentication in the Gbit/second rates
- 1 January 1997
- book chapter
- Published by Springer Nature
- p. 172-189
- https://doi.org/10.1007/bfb0052345
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- The Security of Cipher Block ChainingPublished by Springer Nature ,2001
- Universal Hashing and Multiple AuthenticationPublished by Springer Nature ,1996
- Keying Hash Functions for Message AuthenticationPublished by Springer Nature ,1996
- New Hash Functions for Message AuthenticationPublished by Springer Nature ,1995
- Bucket Hashing and its Application to Fast Message AuthenticationPublished by Springer Nature ,1995
- Universal hashing and authentication codesDesigns, Codes and Cryptography, 1994
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- On Computationally Secure Authentication Tags Requiring Short Secret Shared KeysPublished by Springer Nature ,1983
- New hash functions and their use in authentication and set equalityJournal of Computer and System Sciences, 1981
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979