Author:
Halevi Shai,Krawczyk Hugo
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. V. Afanassiev, C. Gehrmann and B. Smeets. Fast Message Authentication using Efficient Polynomial Evaluation Appeares in these proceedings.
2. M. Atici and D. Stinson. Universal Hashing and Multiple Authentication Advances in Cryptology — CRYPTO ’96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz, ed., Springer-Verlag, 1996. pp. 16–30.
3. M. Bellare, R. Canetti and H. Krawczyk. Keying hash functions for message authentication. Advances in Cryptology — CRYPTO ’96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz, ed., Springer-Verlag, 1996. pp. 1–15.
4. M. Bellare, J. Kilian and P. Rogaway. The security of cipher block chaining. Advances in Cryptology — CRYPTO ’94 Proceedings, Lecture Notes in Computer Science Vol. 839, Y. Desmedt, ed., Springer-Verlag, 1994. pp. 341–358.
5. A. Bosselaers, R. Govaerts, J. Vandewalle. Fast Hashing on the Pentium, Advances in Cryptology — CRYPTO ’96 Proceedings Lecture Notes in Computer Science Vol. 1109, N. Koblitz, ed., Springer-Verlag, 1996. pp. 298–312.
Cited by
74 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献