Bucket Hashing and its Application to Fast Message Authentication
Phillip Rogaway
- pp 29-42
Reads0
Chats0
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.Abstract:
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.read more
Citations
More filters
Book ChapterDOI
Γ-MAC[H, P]: a new universal MAC scheme
TL;DR: A new class of universal hash function families called almost regular universal (e−ARU) is introduced, Informally, an e− ARU hash function family is almost universal, and additionally provides almost regularity.
Book ChapterDOI
On security of universal hash function based multiple authentication
TL;DR: It is shown that the unconditional security cannot be guaranteed if the hash function output for the first message is not encrypted, as remarked in [1].
Book ChapterDOI
Cloud Storage over Multiple Data Centers
TL;DR: Cloud storage has become a booming trend in the last few years and individual developers, companies, organizations, and even governments have either taken steps or at least shown great interests in data migration from self-maintained infrastructure into cloud.
Journal Article
Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries.
Journal ArticleDOI
Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
Khodakhast Bibak,Robert Ritchie +1 more
TL;DR: The PRF(Hash, Nonce) as mentioned in this paper is a key-efficient almost-strongly universal (ASU) MAC scheme for authentication in quantum key distribution (QKD).
References
More filters
Book
Graph theory with applications
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Journal ArticleDOI
Graph theory with applications (revised edition), by J. A. Bondy and U.S.R. Murty. Pp x, 264. £5·95 paperback. 1977. SBN 0 333 22694 1 (Macmillan)
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI
A digital signature scheme secure against adaptive chosen-message attacks
TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.