搜索结果: 1-11 共查到“universal hash”相关记录11条 . 查询时间(0.156 秒)
A Uniform Class of Weak Keys for Universal Hash Functions
Universal hash function weak key Wegman-Carter scheme
2017/5/23
In this paper we investigate weak keys of universal hash functions (UHFs) from their combinatorial properties. We find that any UHF has a general class of keys, which makes the combinatorial propertie...
A Fast Single-Key Two-Level Universal Hash Function
universal hash function Horner's rule BRW polynomials
2016/12/7
Universal hash functions based on univariate polynomials are well known, e.g. \sym{Poly1305} and \sym{GHASH}. Using Horner's rule to evaluate such hash functions require Г−1Г−1 field multi...
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Almost universal hash function related-key attack
2015/12/24
Universal hash functions (UHFs) have been extensively used in the design of cryptographic schemes. If we consider the related-key attack against these UHF-based schemes, some of them may not be secure...
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Linear Secret Sharing Schemes Linear Time Sharing Robust Secret Sharing
2015/12/21
A linear near-threshold secret sharing scheme with both linear time sharing and reconstruction
algorithms and large secrets (i.e. secrets of size Ω(n)). Thus, the computational overhead per
sh...
On an almost-universal hash function family with applications to authentication and secrecy codes
Universal hashing authentication code with secrecy
2015/12/18
Universal hashing, discovered by Carter and Wegman in 1979, has many important
applications in computer science. The following family, called MMH∗ by Halevi and
Krawczyk in 1997, is well known...
Automated Security Proofs for Almost-Universal Hash for MAC verification
block ciphers hash functions
2014/3/12
Message authentication codes (MACs) are an essential primitive in cryptography. They are used to ensure the integrity and authenticity of a message, and can also be used as a building block for larger...
Short-output universal hash functions and their use in fast and secure message authentication
universal hash function
2012/3/29
Message authentication codes usually require the underlining universal hash functions to have a long output so that the probability of successfully forging messages is low enough for cryptographic pur...
New combinatorial bounds for universal hash functions
New combinatorial bounds universal hash functions
2009/6/12
Using combinatorial analysis, we introduce a new lower bound for the key length in an
almost universal hash function, which is tighter than another similar bound derived from an
well-studied equival...
A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices
universal hash function word oriented LFSRs message authentication codes
2009/6/4
A new multi-linear universal hash family is described. Messages are sequences over a finite
field IFq while keys are sequences over an extension field IFqn. A linear map from IFqn to itself is used...
Efficient Tweakable Enciphering Schemes from(Block-Wise)Universal Hash Functions
modes of operations tweakable encryption strong pseudo-random permutation
2009/6/2
We present several constructions of tweakable enciphering schemes which use a single encryption
layer between two layers of universal hash function computation. The earliest known construction
of th...
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Universal Hash Proofs Paradigm Adaptive Chosen Ciphertext Secure Public-Key Encryption
2009/4/16
We present several new and fairly practical public-key encryption schemes and prove them
secure against adaptive chosen ciphertext attack. One scheme is based on Paillier's Decision
Composite Residu...