We introduce a new technique for generating a message authentication code (MAC). At its center is a simple metaphor: to (non-cryptographically) hash a string x, cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets’ contents. Used in the context of Wegman-Carter authentication, this style of hash function provides the fastest known approach to software message authentication.
CITATION STYLE
Rogaway, P. (1995). Bucket hashing and its application to fast message authentication. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 963, pp. 29–42). Springer Verlag. https://doi.org/10.1007/3-540-44750-4_3
Mendeley helps you to discover research relevant for your work.