scientific article; zbMATH DE number 1418298
From MaRDI portal
Publication:4941858
zbMath0940.94021MaRDI QIDQ4941858
Zulfikar Ramzan, Sarvar Patel, Mark H. Etzel
Publication date: 26 July 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (10)
Optimal forgeries against polynomial-based MACs and GCM ⋮ On weak keys and forgery attacks against polynomial-based MAC schemes ⋮ On Efficient Message Authentication Via Block Cipher Design Techniques ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ Об одном семействе универсальных функций хеширования ⋮ Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms ⋮ The power of primes: security of authentication based on a universal hash-function family ⋮ Коды аутентификации с секретностью (обзор) ⋮ Revisiting construction of online cipher in hash-ECB-hash structure ⋮ Quantum key distribution using universal hash functions over finite fields
This page was built for publication: