Universal hashing and authentication codes

94Citations
Citations of this article
62Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we study the application of universal hashing to the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the number of authenticators is exponentially small compared to the number of possible source states (plaintext messages). We formally define some new classes of hash functions and then prove some new bounds and give some general constructions for these classes of hash functions. Then we discuss the implications to authentication codes.

Cite

CITATION STYLE

APA

Stinson, D. R. (1992). Universal hashing and authentication codes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 576 LNCS, pp. 74–85). Springer Verlag. https://doi.org/10.1007/3-540-46766-1_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free