[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Keying hash functions for message authentication

M Bellare, R Canetti, H Krawczyk - … Barbara, California, USA August 18–22 …, 1996 - Springer
The use of cryptographic hash functions like MD5 or SHA-1 for message authentication has
become a standard approach in many applications, particularly Internet security protocols …

A secure and optimally efficient multi‐authority election scheme

R Cramer, R Gennaro… - European transactions on …, 1997 - Wiley Online Library
In this paper we present a new multi‐authority secret‐ballot election scheme that guarantees
privacy, universal veriability, and robustness. It is the first scheme for which the performance …

UMAC: Fast and secure message authentication

J Black, S Halevi, H Krawczyk, T Krovetz… - Advances in Cryptology …, 1999 - Springer
We describe a message authentication algorithm, UMAC, which can authenticate messages
(in software, on contemporary machines) roughly an order of magnitude faster than current …

Fast hashing and rotation-symmetric functions

J Pieprzyk, C Qu - 2024 - openrepository.mephi.ru
Efficient hashing is a centerpiece of modern Cryptography. The progress in computing
technology enables us to use 64-bit machines with the promise of 128-bit machines in the …

[PDF][PDF] Security and privacy in radio-frequency identification devices

SA Weis - 2003 - dspace.mit.edu
Abstract Radio Frequency Identification (RFID) systems are a common and useful tool in
manufacturing, supply chain management and retail inventory control. Optical barcodes …

On fast and provably secure message authentication based on universal hashing

V Shoup - Annual International Cryptology Conference, 1996 - Springer
There are well-known techniques for message authentication using universal hash
functions. This approach seems very promising, as it provides schemes that are both …

A review of SIMD multimedia extensions and their usage in scientific and engineering applications

M Hassaballah, S Omran, YB Mahdy - The Computer Journal, 2008 - ieeexplore.ieee.org
The volume and complexity of data processed by today's personal computers are increasing
exponentially, placing incredible demands on the microprocessors. In the meantime …

MMH: Software message authentication in the Gbit/second rates

S Halevi, H Krawczyk - International Workshop on Fast Software …, 1997 - Springer
We describe a construction of almost universal hash functions suitable for very fast software
implementation and applicable to the hashing of variable size data and fast cryptographic …

Scheduling security-critical real-time applications on clusters

T Xie, X Qin - IEEE transactions on computers, 2006 - ieeexplore.ieee.org
Security-critical real-time applications such as military aircraft flight control systems have
mandatory security requirements in addition to stringent timing constraints. Conventional …