Basel Alomair, Andrew Clark and Radha Poovendran Communicated by xxx Abstract. Message authentication codes (MACs) based on universal hash-function families are be-coming increasingly popular due to their fast implementation. In this paper, we investigate a family of universal hash functions that has been appeared repeatedly in the literature and provide a detailed algebraic analysis for the security of authentication codes based on this universal hash family. In particular, the universal hash family under analysis, as appeared in the literature, uses operation in the finite field Zp. No previous work has studied the extension of such universal hash family when computations are performed modulo a non-prime integer n. In this work, we provid...
Authentication theory deals with problems connected with the protection of information sent over ins...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
Hash families are basic combinatorial structures, which appear under various disguises in cryptology...
AbstractBoneh and Venkatesan have recently proposed an approach to proving that a reasonably small p...
We consider hardware-oriented message authentication, more specifically universal hash functions. We...
Boneh and Venkatesan have recently proposed an approach to proving that a reasonably small portions ...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. This paper eviews constructions of hash functions and MAC algorithms based on block cipher...
In this thesis we study a class of authentication codes with secrecy. We obtain the maximum success ...
Universal hash functions are commonly used primitives for fast and secure message authentication in ...
Authentication theory deals with problems connected with the protection of information sent over ins...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
Hash families are basic combinatorial structures, which appear under various disguises in cryptology...
AbstractBoneh and Venkatesan have recently proposed an approach to proving that a reasonably small p...
We consider hardware-oriented message authentication, more specifically universal hash functions. We...
Boneh and Venkatesan have recently proposed an approach to proving that a reasonably small portions ...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Abstract. This paper eviews constructions of hash functions and MAC algorithms based on block cipher...
In this thesis we study a class of authentication codes with secrecy. We obtain the maximum success ...
Universal hash functions are commonly used primitives for fast and secure message authentication in ...
Authentication theory deals with problems connected with the protection of information sent over ins...
Abstract. We consider the security of message authentication code (MAC) algorithms, and the construc...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...