{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:52:45Z","timestamp":1725475965446},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540340751"},{"type":"electronic","value":"9783540340768"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11751595_45","type":"book-chapter","created":{"date-parts":[[2006,5,11]],"date-time":"2006-05-11T14:27:59Z","timestamp":1147357679000},"page":"416-425","source":"Crossref","is-referenced-by-count":1,"title":["New Constructions of Universal Hash Functions Based on Function Sums"],"prefix":"10.1007","author":[{"given":"Khoongming","family":"Khoo","sequence":"first","affiliation":[]},{"given":"Swee-Huay","family":"Heng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0166-218X(89)90001-2","volume":"25","author":"D. Ash","year":"1989","unstructured":"Ash, D., Blake, I., Vanstone, S.: Low complexity normal bases. Discrete Applied Mathematics\u00a025, 191\u2013210 (1989)","journal-title":"Discrete Applied Mathematics"},{"issue":"1","key":"45_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology\u00a04(1), 3\u201372 (1991)","journal-title":"Journal of Cryptology"},{"key":"45_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-48405-1_14","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"J. Black","year":"1999","unstructured":"Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and secure message authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 216\u2013233. Springer, Heidelberg (1999)"},{"key":"45_CR4","series-title":"Lecture Notes in Computer Science","first-page":"79","volume-title":"Advances in Cryptology","author":"G. Brassard","year":"1999","unstructured":"Brassard, G.: On computationally secure authentication tags requiring short secret shared keys. In: McCurley, K.S., Ziegler, C.D. (eds.) Advances in Cryptology 1999. LNCS, vol.\u00a01440, pp. 79\u201386. Springer, Heidelberg (1999)"},{"key":"45_CR5","unstructured":"Budaghyan, L., Carlet, C., Pott, A.: New Classes of Almost Bent and Almost Perfect Nonlinear Functions. In: Proceedings of Workshop on Coding and Cryptography 2005, pp. 306\u2013315 (2005)"},{"issue":"2","key":"45_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. Journal of Computer and System Sciences\u00a018(2), 143\u2013154 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"45_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-48405-1_15","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"M. Etzel","year":"1999","unstructured":"Etzel, M., Patel, S., Ramzan, Z.: SQUARE HASH: Fast message authentication via optimized universal hash functions. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 234\u2013251. Springer, Heidelberg (1999)"},{"key":"45_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0052345","volume-title":"Fast Software Encryption","author":"S. Halevi","year":"1997","unstructured":"Halevi, S., Krawczyk, H.: MMH: Message authentication in software in the gbit\/second rates. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 172\u2013189. Springer, Heidelberg (1997)"},{"key":"45_CR9","doi-asserted-by":"crossref","unstructured":"Helleseth, T.: Correlation of m-sequences and related topics. In: Sequences and their Applications, SETA 1998, pp. 49\u201366 (1999)","DOI":"10.1007\/978-1-4471-0551-0_4"},{"key":"45_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-68697-5_3","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"T. Helleseth","year":"1996","unstructured":"Helleseth, T., Johansson, T.: Universal hash functions from exponential sums over finite fields and galois rings. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 31\u201344. Springer, Heidelberg (1996)"},{"key":"45_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1007\/3-540-45067-X_45","volume-title":"Information Security and Privacy","author":"S.-H. Heng","year":"2003","unstructured":"Heng, S.-H., Kurosawa, K.: Square hash with a small key size. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 522\u2013531. Springer, Heidelberg (2003)"},{"key":"45_CR12","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/ISIT.2004.1365242","volume-title":"Proceedings of 2004 IEEE International Symposium on Information Theory \u2014 ISIT 2004","author":"K. Khoo","year":"2004","unstructured":"Khoo, K., Heng, S.-H.: Universal Hash Functions over GF(2\n                    n\n                  ). In: Proceedings of 2004 IEEE International Symposium on Information Theory \u2014 ISIT 2004, p. 205. IEEE Press, Los Alamitos (2004)"},{"key":"45_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"key":"45_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/3-540-49264-X_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"H. Krawczyk","year":"1995","unstructured":"Krawczyk, H.: New hash functions for message authentication. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 301\u2013310. Springer, Heidelberg (1995)"},{"key":"45_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-68697-5_24","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"V. Shoup","year":"1996","unstructured":"Shoup, V.: On fast and provably secure message authentication based on universal hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 313\u2013328. Springer, Heidelberg (1996)"},{"key":"45_CR16","first-page":"7","volume":"114","author":"D.R. Stinson","year":"1996","unstructured":"Stinson, D.R.: On the connections between universal hashing, combinatorial designs and error-correcting codes. Congressus Numerantium\u00a0114, 7\u201327 (1996)","journal-title":"Congressus Numerantium"},{"issue":"3","key":"45_CR17","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences\u00a022(3), 265\u2013279 (1981)","journal-title":"Journal of Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications - ICCSA 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11751595_45.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:59:58Z","timestamp":1619506798000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11751595_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540340751","9783540340768"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11751595_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}