Abstract. Let d ≥ 1 be an integer and R1 be a finite ring whose el-ements are called block. A d-block universal hash over R1 is a vector of d multivariate polynomials in message and key block such that the maximum differential probability of the hash function is “low”. Two such single block hashes are pseudo dot-product (PDP) hash and Bernstein-Rabin-Winograd (BRW) hash which require n 2 multiplications for n mes-sage blocks. The Toeplitz construction and d independent invocations of PDP are d-block hash outputs which require d × n 2 multiplications. How-ever, here we show that at least (d − 1) + n 2 multiplications are necessary to compute a universal hash over n message blocks. We construct a d-block universal hash, called EHC, which requ...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
AbstractLet n,ℓ be positive integers with ℓ≤2n−1. Let R be an arbitrary nontrivial ring, not necessa...
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Us...
AbstractWe introduce a method for constructing optimally universal hash families and equivalently RB...
The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a...
AbstractBryant [On the complexity of VLSI implementations and graph representations of boolean funct...
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we ...
The aim of this work is to create a model of hashing with an acceptable worst case time complexity. ...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
Using the pigeon-hole principle, we derive a new bound for the key length in a t-wise almost univers...
AbstractAny implementation of Carter-Wegman universal hashing from n-bit strings to m-bit strings re...
A universal class of hash functions which utilize multiplication over a finite field is described. T...
Basel Alomair, Andrew Clark and Radha Poovendran Communicated by xxx Abstract. Message authenticatio...
AbstractLetnbinary numbers of lengthnbe given. The Boolean function “Multiple Product”MPnasks for (s...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
AbstractLet n,ℓ be positive integers with ℓ≤2n−1. Let R be an arbitrary nontrivial ring, not necessa...
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Us...
AbstractWe introduce a method for constructing optimally universal hash families and equivalently RB...
The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a...
AbstractBryant [On the complexity of VLSI implementations and graph representations of boolean funct...
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we ...
The aim of this work is to create a model of hashing with an acceptable worst case time complexity. ...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
Using the pigeon-hole principle, we derive a new bound for the key length in a t-wise almost univers...
AbstractAny implementation of Carter-Wegman universal hashing from n-bit strings to m-bit strings re...
A universal class of hash functions which utilize multiplication over a finite field is described. T...
Basel Alomair, Andrew Clark and Radha Poovendran Communicated by xxx Abstract. Message authenticatio...
AbstractLetnbinary numbers of lengthnbe given. The Boolean function “Multiple Product”MPnasks for (s...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
AbstractLet n,ℓ be positive integers with ℓ≤2n−1. Let R be an arbitrary nontrivial ring, not necessa...