This paper compares the parameters sizes and software per- formance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toeplitz hashing, division hashing, evaluation hashing, and MMH hashing. An objective comparison be- tween these widely varying approaches is achieved by deffining construc- tions that of eracomparable security level. It is also demonstrated how the security of these constructions compares favorably to existing MAC algorithms, the security of which is less understood.
CITATION STYLE
Nevelsteen, W., & Preneel, B. (1999). Software performance of universal hash functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1592, pp. 24–41). Springer Verlag. https://doi.org/10.1007/3-540-48910-X_3
Mendeley helps you to discover research relevant for your work.