Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in computer science. MMH$^*$, which was shown to be $\Delta$-universal by Halevi and Krawczyk in 1997, is a well-known universal hash function family. We introduce a variant of MMH$^*$, that we call GRDH, where we use an arbitrary integer $n>1$ instead of prime $p$ and let the keys $\mathbf{x}=\langle x_1, \ldots, x_k \rangle \in \mathbb{Z}_n^k$ satisfy the conditions $\gcd(x_i,n)=t_i$ ($1\leq i\leq k$), where $t_1,\ldots,t_k$ are given positive divisors of $n$. Then via connecting the universal hashing problem to the number of solutions of restricted linear congruences, we prove that the family GRDH is an $\varepsilon$-almost-$\Delta$-universal fami...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
A fundamental result in cryptography is that a digital signature scheme can be constructed from an a...
We present several new and fairly practical public-key encryption schemes and prove them secure agai...
Basel Alomair, Andrew Clark and Radha Poovendran Communicated by xxx Abstract. Message authenticatio...
AbstractWe introduce a method for constructing optimally universal hash families and equivalently RB...
Hash families are basic combinatorial structures, which appear under various disguises in cryptology...
The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
Universal hash functions (UHFs) have been extensively used in the design of cryptographic schemes. I...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
In this paper we investigate weak keys of universal hash functions (UHFs) from their combinatorial p...
This correspondence is concerned with new connections between source coding and two kinds of familie...
In this paper we use coding theory to give simple explanations of some recent results on universal h...
Message authentication codes usually require the underlining universal hash functions to have a long...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
A fundamental result in cryptography is that a digital signature scheme can be constructed from an a...
We present several new and fairly practical public-key encryption schemes and prove them secure agai...
Basel Alomair, Andrew Clark and Radha Poovendran Communicated by xxx Abstract. Message authenticatio...
AbstractWe introduce a method for constructing optimally universal hash families and equivalently RB...
Hash families are basic combinatorial structures, which appear under various disguises in cryptology...
The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
Universal hash functions (UHFs) have been extensively used in the design of cryptographic schemes. I...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
In this paper we investigate weak keys of universal hash functions (UHFs) from their combinatorial p...
This correspondence is concerned with new connections between source coding and two kinds of familie...
In this paper we use coding theory to give simple explanations of some recent results on universal h...
Message authentication codes usually require the underlining universal hash functions to have a long...
Universal hashing found a lot of applications in computer science. In cryptography the most importan...
A fundamental result in cryptography is that a digital signature scheme can be constructed from an a...
We present several new and fairly practical public-key encryption schemes and prove them secure agai...