Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Unconditionally secure authentication schemes and practical and theoretical consequences
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Small-bias probability spaces: efficient constructions and applications
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
The computational complexity of universal hashing
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
A programmable 800 Mbit/s CRC check/generator unit for LANs and MANs
Computer Networks and ISDN Systems - Special issue on high-speed local and metropolitan area networks
A shift register construction of unconditionally secure authentication codes
Designs, Codes and Cryptography
An integrity check value algorithm for stream ciphers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On families of hash functions via geometric codes and concatenation
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Codes for interactive authentication
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On the relation between A-codes and codes correcting independent errors
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Universal Hashing and Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Fast Cryptographic Checksum Algorithm Based on Stream Ciphers
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Simple construction of almost k-wise independent random variables
SFCS '90 Proceedings of the 31st Annual Symposium on Foundations of Computer Science
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Authenticated-encryption with associated-data
Proceedings of the 9th ACM conference on Computer and communications security
IEEE/ACM Transactions on Networking (TON)
Efficient Strongly Universal and Optimally Universal Hashing
MFCS '99 Proceedings of the 24th International Symposium on Mathematical Foundations of Computer Science
Message Authentication Codes with Error Correcting Capabilities
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Modes of Operation of Stream Ciphers
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
UMAC: Fast and Secure Message Authentication
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Stateless Evaluation of Pseudorandom Functions: Security beyond the Birthday Barrier
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
On the Round Security of Symmetric-Key Cryptographic Primitives
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?)
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Online Ciphers and the Hash-CBC Construction
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
MDx-MAC and Building Fast MACs from Hash Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Bucket Hashing and its Application to Fast Message Authentication
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
On Fast and Provably Secure Message Authentication Based on Universal Hashing
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Universal Hashing and Multiple Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Does Encryption with Redundancy Provide Authenticity?
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
A New Ultrafast Stream Cipher Design: COS Ciphers
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Encryption Modes with Almost Free Message Integrity
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Designs, Codes and Cryptography
Energy Scalable Universal Hashing
IEEE Transactions on Computers
Efficient reliable communication over partially authenticated networks
Distributed Computing - Special issue: PODC 02
Foundations of cryptography: a primer
Foundations and Trends® in Theoretical Computer Science
Computer Networks: The International Journal of Computer and Telecommunications Networking
Verifying distributed erasure-coded data
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Authenticating ad hoc networks by comparison of short digests
Information and Computation
FPGA Intrinsic PUFs and Their Use for IP Protection
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Efficient Helper Data Key Extractor on FPGAs
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
A fast real-time memory authentication protocol
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Information Systems Frontiers
An Integrated ECC-MAC Based on RS Code
Transactions on Computational Science IV
A new hardware efficient stream cipher based on hash functions
International Journal of Communication Networks and Distributed Systems
On a Construction of Short Digests for Authenticating Ad Hoc Networks
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
MAC Precomputation with Applications to Secure Memory
ISC '09 Proceedings of the 12th International Conference on Information Security
HB - MAC: Improving the Random - HB# Authentication Protocol
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Low-Overhead Implementation of a Soft Decision Helper Data Algorithm for SRAM PUFs
CHES '09 Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
HAIL: a high-availability and integrity layer for cloud storage
Proceedings of the 16th ACM conference on Computer and communications security
Efficient tweakable enciphering schemes from (block-wise) universal hash functions
IEEE Transactions on Information Theory
One-wayness equivalent to general factoring
IEEE Transactions on Information Theory
On Physical Obfuscation of Cryptographic Algorithms
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Security of trusted repeater quantum key distribution networks
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Bucket hashing with a small key size
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
New hash functions for message authentication
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Software performance of universal hash functions
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Resistance against general iterated attacks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Using hash functions as a hedge against chosen ciphertext attack
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Square hash with a small key size
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Cryptographic primitives enforcing communication and storage complexity
FC'02 Proceedings of the 6th international conference on Financial cryptography
An analysis of proxy signatures: is a secure channel necessary?
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
On efficient message authentication via block cipher design techniques
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
HB#: increasing the security and efficiency of HB+
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Mutual authentication scheme for EPC tags- readers in the supply chain
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Secure wireless communication with dynamic secrets
INFOCOM'10 Proceedings of the 29th conference on Information communications
Fast inter-domain mobility with in-packet bloom filters
Proceedings of the fifth ACM international workshop on Mobility in the evolving internet architecture
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Remote data checking for network coding-based distributed storage systems
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Improving the quality of ring oscillator PUFs on FPGAs
WESS '10 Proceedings of the 5th Workshop on Embedded Systems Security
An improved memory integrity protection scheme
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Crypto topics and applications I
Algorithms and theory of computation handbook
Online ciphers from tweakable blockciphers
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
Authentication protocols based on low-bandwidth unspoofable channels: A comparative survey
Journal of Computer Security
New encoding schemes for quantum authentication
Quantum Information & Computation
E-MACs: towards more secure and more efficient constructions of secure channels
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
A security and high-availability layer for cloud storage
WISS'10 Proceedings of the 2010 international conference on Web information systems engineering
Extractors against side-channel attacks: weak or strong?
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Lightweight and secure PUF key storage using limits of machine learning
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Location-based security for ID document and ID card enrollment stations
Proceedings of the 14th Communications and Networking Symposium
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Efficient constructions of variable-input-length block ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
A variant of poly1305 MAC and its security proof
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
The universality of iterated hashing over variable-length strings
Discrete Applied Mathematics
Badger – a fast and provably secure MAC
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Security problems of systems of extremely weak devices
Annales UMCS, Informatica - Security Systems
Entropic security and the encryption of high entropy messages
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
A practical and secure communication protocol in the bounded storage model
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Limits of the cryptographic realization of dolev-yao-style XOR
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
The security and performance of the galois/counter mode (GCM) of operation
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
SAS-Based authenticated key agreement
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
New constructions of universal hash functions based on function sums
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
PRF domain extension using DAGs
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Parallelizable authentication trees
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Analysis of the initial and modified versions of the candidate 3GPP integrity algorithm 128-EIA3
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Energy efficient authentication strategies for network coding
Concurrency and Computation: Practice & Experience
BloomCasting: security in bloom filter based multicast
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Authenticated encryption: how reordering can impact performance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Length-doubling ciphers and tweakable ciphers
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Improving the security of MACs via randomized message preprocessing
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
On the feasibility of completely wireless datacenters
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems
Γ-MAC[H, P]: a new universal MAC scheme
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
On security of universal hash function based multiple authentication
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
A real-time privacy amplification scheme in quantum key distribution
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Comparison of caching strategies in modern cellular backhaul networks
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications
Proceedings of the 5th conference on Innovations in theoretical computer science
A new multi-linear universal hash family
Designs, Codes and Cryptography
On the feasibility of completely wirelesss datacenters
IEEE/ACM Transactions on Networking (TON)
Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol
Wireless Personal Communications: An International Journal
Key-leakage evaluation of authentication in quantum key distribution with finite resources
Quantum Information Processing
Hi-index | 0.12 |
We present simple and efficient hash functions applicable to secure authentication of information. The constructions are mainly intended for message authentication in systems implementing stream cipher encryption and are suitable for other applications as well. The proposed hash functions are implemented through linear feedback shift registers and therefore attractive for hardware applications. As an example, a single 64 bit LFSR will be used to authenticate 1 Gbit of information with a failure probability of less than 2-30. One of the constructions is the cryptographic version of the well known cyclic redundancy codes (CRC); the other is based on Toeplitz hashing where the matrix entries are generated by a LFSR. The later construction achieves essentially the same hashing and authentication strength of a completely random matrix but at a substantially lower cost in randomness, key size and implementation complexity. Of independent interest is our characterization of the properties required from a family of hash functions in order to be secure for authentication when combined with a (secure) stream cipher.