搜索结果: 1-6 共查到“军事学 universal hash functions”相关记录6条 . 查询时间(0.093 秒)
A Uniform Class of Weak Keys for Universal Hash Functions
Universal hash function weak key Wegman-Carter scheme
2017/5/23
In this paper we investigate weak keys of universal hash functions (UHFs) from their combinatorial properties. We find that any UHF has a general class of keys, which makes the combinatorial propertie...
Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications
Almost universal hash function related-key attack
2015/12/24
Universal hash functions (UHFs) have been extensively used in the design of cryptographic schemes. If we consider the related-key attack against these UHF-based schemes, some of them may not be secure...
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
Linear Secret Sharing Schemes Linear Time Sharing Robust Secret Sharing
2015/12/21
A linear near-threshold secret sharing scheme with both linear time sharing and reconstruction
algorithms and large secrets (i.e. secrets of size Ω(n)). Thus, the computational overhead per
sh...
Short-output universal hash functions and their use in fast and secure message authentication
universal hash function
2012/3/29
Message authentication codes usually require the underlining universal hash functions to have a long output so that the probability of successfully forging messages is low enough for cryptographic pur...
New combinatorial bounds for universal hash functions
New combinatorial bounds universal hash functions
2009/6/12
Using combinatorial analysis, we introduce a new lower bound for the key length in an
almost universal hash function, which is tighter than another similar bound derived from an
well-studied equival...
Efficient Tweakable Enciphering Schemes from(Block-Wise)Universal Hash Functions
modes of operations tweakable encryption strong pseudo-random permutation
2009/6/2
We present several constructions of tweakable enciphering schemes which use a single encryption
layer between two layers of universal hash function computation. The earliest known construction
of th...