Bucket hashing and its application to fast message authentication

70Citations
Citations of this article
45Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (non-cryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets’ contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.

Cite

CITATION STYLE

APA

Rogaway, P. (1995). Bucket hashing and its application to fast message authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 963, pp. 29–42). Springer Verlag. https://doi.org/10.1007/3-540-44750-4_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free