Software performance of universal hash functions
Citations
1,235 citations
Cites background from "Software performance of universal h..."
...research on universal hash functions (see for example [33, 27 ])....
[...]
759 citations
419 citations
Cites background from "Software performance of universal h..."
...UMAC employs a subkey generation process in which the shared (convenientlength) key is mapped into UMAC’s internal keys....
[...]
...The performance curves for the Alpha and PowerPC look similar to the Pentium II— they perform better than the reference MACs at around the same message length, and level out at around the same message length....
[...]
...Unlike conventional, inherently serial MACs, UMAC is parallelizable, and will have ever-faster implementations as machines offer up increasing amounts of parallelism....
[...]
...Numbers n and w are two of UMAC’s parameters....
[...]
...While any reasonable setting of these parameters should out-perform conventional MACs, the fastest version of UMAC for one platform differs from the fastest version for another platform....
[...]
371 citations
Cites methods from "Software performance of universal h..."
...Several subsequent papers reported implementations of polynomial-evaluation MACs over binary fields: [26] by Shoup; [3] by Afanassiev, Gehrmann, and Smeets, reinventing Kaminski’s division algorithm in [16]; [20] by Nevelsteen and Preneel....
[...]
359 citations
References
14,980 citations
"Software performance of universal h..." refers methods in this paper
...Digital signatures, introduced in 1976 by Diffie and Hellman [13], are the main tool for protecting the integrity of information....
[...]
8,777 citations
"Software performance of universal h..." refers background in this paper
...Subsequently their theory has been developed further by Simmons, analogous to Shannon’s theory of secrecy systems [34]....
[...]
3,514 citations
"Software performance of universal h..." refers background in this paper
...For MD5 [32], SHA-1 [17], RIPEMD-160, and RIPEMD-128 [15] the speeds are respectively 228 Mbit/s, 122 Mbit/s, 101 Mbit/s, and 173 Mbit/s (note however that the security of MD5 as a hash-function is questionable; this has no immediate impact to its use in HMAC and MDx-MAC, but it is prudent to plan for its replacement)....
[...]
2,886 citations
"Software performance of universal h..." refers background or methods in this paper
...Stinson improves the work by Wegman and Carter, and establishes an explicit link between authentication codes and strongly universal hash functions [39]....
[...]
...This research developed from exploring connections to the rich theory of error-correcting codes, and connects to the work of Wegman and Carter [12,40]....
[...]
...Carter and Wegman make the following key observations: i) long messages can be authenticated efficiently using short keys if the number of bits in the authentication tag is increased slightly compared to ‘perfect’ schemes; ii) if a message is hashed to a short authentication tag, weaker properties are sufficient for the first stage of the compression; iii) under certain conditions, the hash function can remain the same for many plaintexts, provided that the hash result is encrypted using a one-time pad....
[...]
...This is the more surprising because Carter and Wegman developed already in the late seventies efficient authentication codes under the name of strongly universal hash functions [12,40]....
[...]
...Several of these results were applied by Wegman and Carter [40]....
[...]