The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has become a standard approach in many applications, particularly Internet security protocols …
R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
In this paper we present a new multi‐authority secret‐ballot election scheme that guarantees privacy, universal veriability, and robustness. It is the first scheme for which the performance …
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines) roughly an order of magnitude faster than current …
Efficient hashing is a centerpiece of modern Cryptography. The progress in computing technology enables us to use 64-bit machines with the promise of 128-bit machines in the …
Abstract Radio Frequency Identification (RFID) systems are a common and useful tool in manufacturing, supply chain management and retail inventory control. Optical barcodes …
V Shoup - Annual International Cryptology Conference, 1996 - Springer
There are well-known techniques for message authentication using universal hash functions. This approach seems very promising, as it provides schemes that are both …
M Hassaballah, S Omran, YB Mahdy - The Computer Journal, 2008 - ieeexplore.ieee.org
The volume and complexity of data processed by today's personal computers are increasing exponentially, placing incredible demands on the microprocessors. In the meantime …
S Halevi, H Krawczyk - International Workshop on Fast Software …, 1997 - Springer
We describe a construction of almost universal hash functions suitable for very fast software implementation and applicable to the hashing of variable size data and fast cryptographic …
T Xie, X Qin - IEEE transactions on computers, 2006 - ieeexplore.ieee.org
Security-critical real-time applications such as military aircraft flight control systems have mandatory security requirements in addition to stringent timing constraints. Conventional …