Software performance of universal hash functions

48Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper compares the parameters sizes and software per- formance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toeplitz hashing, division hashing, evaluation hashing, and MMH hashing. An objective comparison be- tween these widely varying approaches is achieved by deffining construc- tions that of eracomparable security level. It is also demonstrated how the security of these constructions compares favorably to existing MAC algorithms, the security of which is less understood.

Cite

CITATION STYLE

APA

Nevelsteen, W., & Preneel, B. (1999). Software performance of universal hash functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1592, pp. 24–41). Springer Verlag. https://doi.org/10.1007/3-540-48910-X_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free