Search

Your search keyword '"Universal hashing"' showing total 1,064 results

Search Constraints

Start Over You searched for: Descriptor "Universal hashing" Remove constraint Descriptor: "Universal hashing"
1,064 results on '"Universal hashing"'

Search Results

1. On the Security of Keyed Hashing Based on Public Permutations

2. EliMAC: Speeding Up LightMAC by around 20%

3. HalftimeHash: Modern Hashing Without 64-Bit Multipliers or Finite Fields

4. Quantum key distribution using universal hash functions over finite fields.

5. Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound

6. Efficient Unconditionally Secure Signatures Using Universal Hashing

7. Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security.

8. EliMAC: Speeding Up LightMAC by around 20%

9. On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

10. Faster Binary-Field Multiplication and Faster Binary-Field MACs

11. Generation of k-wise independent random variables with small randomness.

12. - A New Universal MAC Scheme

13. Independence of Tabulation-Based Hash Classes

14. Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3

15. Universal Hash Based Built-In Secure Transport in FlexE Over WDM Networks

16. Symmetric Blind Information Reconciliation and Hash-function-based Verification for Quantum Key Distribution.

17. On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes.

18. How to Protect Yourself without Perfect Shredding

19. DOTMIX-Pro: faster and more efficient variants of DOTMIX for dynamic-multithreading platforms

20. Message Authentication on 64-Bit Architectures

22. Regular and almost universal hashing: an efficient implementation.

24. Development of a modified UMAC algorithm based on crypto­code constructions

25. The Message Authentication Code Based on Universal Hashing

27. EXTENSION OF SSL/TLS FOR QUANTUM CRYPTOGRAPHY

28. Differential properties of authenticated encryption mode based on universal hash function (XTSMAC)

29. Faster 64-bit universal hashing using carry-less multiplications.

30. Low-Complexity Secret Sharing Schemes Using Correlated Random Variables and Rate-Limited Public Communication

31. Generation of k-wise independent random variables with small randomness

32. Reducing DRAM Refresh Rate Using Retention Time Aware Universal Hashing Redundancy Repair

33. DETERMINATION OF WAYS OF SPOOFING RESISTANCE IMPROVEMENT OF WARNING SYSTEMS OF NGU SECURITY SYSTEMS AT NUCLEAR POWER LANTS

34. On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes.

35. Secret key extraction in direct reconciliation CV-QKD systems

36. HalftimeHash: Modern Hashing Without 64-Bit Multipliers or Finite Fields

37. Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure

38. Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes

39. A Lightweight and Efficient Physical Layer Key Generation Mechanism for MANETs

40. A Built-in Hash Permutation Assisted Cross-layer Secure Transport in End-to-End FlexE over WDM Networks

42. Sparse Hashing for Scalable Approximate Model Counting: Theory and Practice

43. SQUAREMIX: A Faster Pseudorandom Number Generator for Dynamic-Multithreading Platforms

44. Towards closing the security gap of Tweak-aNd-Tweak (TNT)

45. Robust and Flexible Discrete Hashing for Cross-Modal Similarity Search

46. Scalable Discrete Supervised Multimedia Hash Learning With Clustering

47. SHISS: Supervised hashing with informative set selection

48. On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes

49. Adaptive hash retrieval with kernel based similarity

50. Robust discrete code modeling for supervised hashing

Catalog

Books, media, physical & digital resources