scispace - formally typeset
Open AccessBook ChapterDOI

Bucket Hashing and its Application to Fast Message Authentication

Reads0
Chats0
TLDR
A new technique for generating a message authentication code (MAC) using a simple metaphor to (noncryptographically) hash a string x, cast each of its words into a small number of buckets, and collect up all the buckets' contents.
Abstract
We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (noncryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions.

TL;DR: In this article, the security of XMACR and EHtM has been studied and the exact security analysis for all of these constructions has been provided, namely up to o(2) tag generation queries.
Journal ArticleDOI

Authenticated encryption: how reordering can impact performance

TL;DR: In this paper, the authors investigated the effect of the method used to construct an authenticated encryption scheme on the performance of the construction and showed that the proposed construction is even more secure than standard authentication based on universal hashing in the sense that the hashing key is resilient to key recovery attacks.
Journal ArticleDOI

On Random Read Access in ${\mathsf{OCB}}$

TL;DR: The scope of random read access and out-of-sequence decryption inOffset codebook mode is explored, and a relaxed notion of AXU, called locally imperfect XOR universal (LIXU) hash, is proposed, which can be of independent interest.

New directions for remote data integrity checking of cloud storage

Bo Chen
TL;DR: RDC-NC is the first RDC scheme for network coding-based distributed storage systems to ensure data remain intact when faced with data corruption, replay, and pollution attacks, and Experimental evaluation shows that RDC- NC is inexpensive for both the clients and the servers.

Packet Processing on Stream Architecture

Yu-Kuen Lai
TL;DR: This dissertation explores the SIMD (Single Instruction, M ultiple Data) stream architecture for network packet processing with several security-r elated applications and characterizes the processing throughput of the applications and explores the tradeoffs on different configurations of stream architecture.
References
More filters
Book

Graph theory with applications

J. A. Bondy
TL;DR: In this paper, the authors present Graph Theory with Applications: Graph theory with applications, a collection of applications of graph theory in the field of Operational Research and Management. Journal of the Operational research Society: Vol. 28, Volume 28, issue 1, pp. 237-238.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Journal ArticleDOI

A digital signature scheme secure against adaptive chosen-message attacks

TL;DR: A digital signature scheme based on the computational difficulty of integer factorization possesses the novel property of being robust against an adaptive chosen-message attack: an adversary who receives signatures for messages of his choice cannot later forge the signature of even a single additional message.