SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions (original) (raw)

Security of Authentication Based on Universal hash Function Family for Mobile and Pervasive Computing

srinivas mani

View PDFchevron_right

VSH, an Efficient and Provable Collision-Resistant Hash Function

Ron Steinfeld

2006

View PDFchevron_right

Bucket Hashing and Its Application to Fast Message Authentication

Phillip Rogaway

Journal of Cryptology, 1999

View PDFchevron_right

Advancing the Cryptographic Hash-Based Message Authentication Code

Ashish Avasthi

International Journal of Engineering and Technology, 2011

View PDFchevron_right

Regular and almost universal hashing: an efficient implementation

Sergey Ignatchenko

Software: Practice and Experience, 2016

View PDFchevron_right

Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices

Di Ma

View PDFchevron_right

FRMAC, a Fast Randomized Message Authentication Code

Eliane Jaulmes

2004

View PDFchevron_right

Efficient Unconditionally Secure Signatures Using Universal Hashing

Erika Andersson

Applied Cryptography and Network Security, 2018

View PDFchevron_right

Maximizing the hash function of authentication codes

Athanasios Kakarountas

Potentials, …, 2006

View PDFchevron_right

An Overview of Cryptographic Hash Functions

Sugata Sanyal

2002

View PDFchevron_right

TWISTERπ - a framework for secure and fast hash functions

Christian Forler

International Journal of Applied Cryptography, 2010

View PDFchevron_right

Aggregated Authentication (AMAC) Using Universal Hash Functions

Wassim Znaidi

2009

View PDFchevron_right

A remark on hash functions for message authentication

Chris Mitchell

Computers & Security, 1989

View PDFchevron_right

On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes

Bruce Kapron

International Journal of Foundations of Computer Science

View PDFchevron_right

Efficient small-sized implementation of the keyed-hash message authentication code

Athanasios Kakarountas

Computer as a Tool, …, 2005

View PDFchevron_right

LHash: A Lightweight Hash Function

Le Nhan Dong

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Software Performance of Universal Hash Functions

Wim Nevelsteen

Lecture Notes in Computer Science, 1999

View PDFchevron_right

New hash functions and their use in authentication and set equality

Larry Carter

Journal of Computer and System Sciences, 1981

View PDFchevron_right

MMAC: Fast and Secure Message Authentication

ali mohammed

International Journal of Science and Research (IJSR), 2017

View PDFchevron_right

Automated Security Proofs for Almost-Universal Hash for MAC Verification

Yassine Lakhnech

Lecture Notes in Computer Science, 2013

View PDFchevron_right

Cryptology ePrint Archive, Report 2004/166, July 2004. FRMAC, a Fast Randomized Message Authentication Code

Eliane Jaulmes

2015

View PDFchevron_right

High-Speed and Low-Power Implementation of Hash Message Authentication Code through Partially Unrolled Techniques

Athanasios Kakarountas

2005

View PDFchevron_right

ZesT: an all-purpose hash function based on Zémor-Tillich

Jean-jacques Quisquater

2008

View PDFchevron_right

[PDF]Design and Analysis of a New Hash Algorithm with Key

Darshan Budwal

View PDFchevron_right

Design and analysis of hash functions

Murali Danda

2007

View PDFchevron_right

MOIM: A NOVEL DESIGN OF CRYPTOGRAPHIC HASH FUNCTION

Imad Yaseen

View PDFchevron_right

A Novel Hash Chain Construction for Simple and Efficient Authentication

Masakazu Soshi

View PDFchevron_right

A New Message Digest Function for Message Authentication

Imrul Hasan

umdrive.memphis.edu

View PDFchevron_right

HaF - A New Family of Hash Functions

Anna Czurylo

Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems, 2012

View PDFchevron_right

SPONGENT: A Lightweight Hash Function

Deniz Toz

View PDFchevron_right

SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT

INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH I J E T M R JOURNAL

International Journal of Engineering Technologies and Management Research, 2020

View PDFchevron_right

Fast and secure hashing based on codes

Lars Knudsen

Lecture Notes in Computer Science, 1997

View PDFchevron_right

An Efficient and Secure One Way Cryptographic Hash Function with Digest Length of 1024Bits

Journal of Computer Science IJCSIS

View PDFchevron_right

Efficient strongly universal and optimally universal hashing

Philipp Woelfel

1999

View PDFchevron_right

Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms

Helena Handschuh

Lecture Notes in Computer Science, 2008

View PDFchevron_right