Author:
Afanassiev Valentine,Gehrmann Christian,Smeets Ben
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. G.J. Simmons, “A survey of information authentication≓, in Contemporary Cryptology, The Science of Information Integrity, ed. G.J. Simmons, IEEE Press, New York, 1992.
2. P. Rogaway, ≓Bucket hashing and its application to fast message authentication≓, Proceedings of CRYPTO ’95, Springer Verlag, pp. 29–42, August, 1995.
3. M. Bellare, J. Kilian, and P. Rogaway, “The security of cipher block chaining≓, Proceedings of CRYPTO’ 94, Springer Verlag, pp. 341–358, August, 1994.
4. M. Wegman and L. Carter, ≓New hash functions and their use in authentication and set equality≓, J. of Computer and System Sciences 22, pp. 265–279, 1981.
5. D. Stinson, ≓Universal hashing and authentication codes≓, Designs, Codes and Cryptography, Vol. 4, pp. 369–380, 1994.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献