AbstractIn this paper we exhibit several new classes of hash functions with certain desirable properties, and introduce two novel applications for hashing which make use of these functions. One class contains a small number of functions, yet is almost universal2. If the functions hash n-bit long names into m-bit indices, then specifying a member of the class requires only O((m + log2log2(n)) · log2(n)) bits as compared to O(n) bits for earlier techniques. For long names, this is about a factor of m larger than the lower bound of m + log2n − log2m bits. An application of this class is a provably secure authentication technique for sending messages over insecure lines. A second class of functions satisfies a much stronger property than univer...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
The article covers the research of message authentication codes based on universal hashing. The new ...
A cryptographic hash function provides message integrity and authentication A function is used t...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
Message authentication codes usually require the underlining universal hash functions to have a long...
There are well-known techniques for message authentication using universal hash functions. This appr...
Hash families are basic combinatorial structures, which appear under various disguises in cryptology...
The best MACs in the cryptographic narrative are based on universal hashing. The major cause followi...
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently...
Crypto graphic hash functions are an important building block for a wide range of applications such ...
The paper presents a theoretical introduction to the cryptographic hash function theory and a statis...
A digest function is a sort of universal hash that takes a key and a message as its inputs. This pap...
Cryptographic hash functions are commonly used as modification detection codes. The goal is to provi...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
The article covers the research of message authentication codes based on universal hashing. The new ...
A cryptographic hash function provides message integrity and authentication A function is used t...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
Message authentication codes usually require the underlining universal hash functions to have a long...
There are well-known techniques for message authentication using universal hash functions. This appr...
Hash families are basic combinatorial structures, which appear under various disguises in cryptology...
The best MACs in the cryptographic narrative are based on universal hashing. The major cause followi...
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently...
Crypto graphic hash functions are an important building block for a wide range of applications such ...
The paper presents a theoretical introduction to the cryptographic hash function theory and a statis...
A digest function is a sort of universal hash that takes a key and a message as its inputs. This pap...
Cryptographic hash functions are commonly used as modification detection codes. The goal is to provi...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
In this paper new families of strongly universal hash functions, or equivalently, authentication cod...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
The article covers the research of message authentication codes based on universal hashing. The new ...
A cryptographic hash function provides message integrity and authentication A function is used t...