Using the pigeon-hole principle, we derive a new bound for the key length in a t-wise almost universal hash function where the multicollision or t-collision probability is bounded above by epsilon in the range [0,1]. The important features of this bound are (1) it decreases very slowly as t increases, and (2) the key length grows at least linearly with the logarithm of the message length. To our knowledge, this is the first almost universal hash bound for any integer t > 1. This work arises from the use of t-wise almost universal hash functions in manual authentication protocols
AbstractAny implementation of Carter-Wegman universal hashing from n-bit strings to m-bit strings re...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
As Knuth noted, a hashing function that is one-to-one on the set of keys in the hash table is highly...
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently...
Message authentication codes usually require the underlining universal hash functions to have a long...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
Abstract. Universal hash functions (UHFs) have been extensively used in the design of cryptographic ...
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaning...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
The aim of this work is to create a model of hashing with an acceptable worst case time complexity. ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
A digest function is a sort of universal hash that takes a key and a message as its inputs. This pap...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
AbstractAny implementation of Carter-Wegman universal hashing from n-bit strings to m-bit strings re...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
As Knuth noted, a hashing function that is one-to-one on the set of keys in the hash table is highly...
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently...
Message authentication codes usually require the underlining universal hash functions to have a long...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
This paper gives an i, put independe, t average linear time algorithm for storage and retrieval on ...
Abstract. Universal hash functions (UHFs) have been extensively used in the design of cryptographic ...
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaning...
AbstractThis paper gives an input independent average linear time algorithm for storage and retrieva...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
The aim of this work is to create a model of hashing with an acceptable worst case time complexity. ...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
A digest function is a sort of universal hash that takes a key and a message as its inputs. This pap...
In this paper we use linear algebraic methods to analyze the performance of several classes of hash ...
AbstractAny implementation of Carter-Wegman universal hashing from n-bit strings to m-bit strings re...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
As Knuth noted, a hashing function that is one-to-one on the set of keys in the hash table is highly...