{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T08:54:02Z","timestamp":1766048042416},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540602217"},{"type":"electronic","value":"9783540447504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1995]]},"DOI":"10.1007\/3-540-44750-4_3","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T08:39:53Z","timestamp":1187253593000},"page":"29-42","source":"Crossref","is-referenced-by-count":56,"title":["Bucket Hashing and its Application to Fast Message Authentication"],"prefix":"10.1007","author":[{"given":"Phillip","family":"Rogaway","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"3_CR1","unstructured":"R. Arnold and D. Coppersmith, \u201cAn alternative to perfect hashing.\u201d IBM RC 10332 (1984)."},{"key":"3_CR2","unstructured":"M. Bellare, O. Goldreich and S. Goldwasser. \u201cIncremental cryptography: The case of hashing and signing.\u201d Advances in Cryptology \u2014 CRYPTO\u2019 94 Proceedings, Springer-Verlag (1994)."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare, J. Kilian and P. Rogaway, \u201cThe security of cipher block chaining.\u201d Advances in Cryptology \u2014 CRYPTO\u2019 94 Proceedings, 341\u2013358 (1994).","DOI":"10.1007\/3-540-48658-5_32"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"J. Bondy and U. Murty, Graph theory with Applications. North Holland (1976).","DOI":"10.1007\/978-1-349-03521-2"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"G. Brassard, \u201cOn computationally secure authentication tags requiring short secret shared keys.\u201d Advances in Cryptology \u2014 CRYPTO\u2019 82 Proceedings, 79\u201386 (1983).","DOI":"10.1007\/978-1-4757-0602-4_7"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"J. Bierbrauer, T. Johansson, G. Kabatianskii and B. Smeets, \u201cOn families of hash functions via geometric codes and concatenation.\u201d Advances in Cryptology\u2014CRYPTO\u2019 93 Proceedings, Springer-Verlag, 331\u2013342 (1994).","DOI":"10.1007\/3-540-48329-2_28"},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"L. Carter and M. Wegman, \u201cUniversal hash functions,\u201d J. of Computer and System Sciences 18, 143\u2013154 (1979).","journal-title":"J. of Computer and System Sciences"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, \u201cUnconditionally secure authentication schemes and practical and theoretical consequences.\u201d Advances in Cryptology \u2014 CRYPTO\u2019 85 Proceedings, Springer-Verlag, 42\u201345 (1985).","DOI":"10.1007\/3-540-39799-X_6"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"P. Gemmell and M. Naor, \u201cCodes for interactive authentication.\u201d Advances in Cryptology \u2014 CRYPTO\u2019 93 Proceedings, Springer-Verlag, 355\u2013367 (1994).","DOI":"10.1007\/3-540-48329-2_30"},{"issue":"4","key":"3_CR10","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreich","year":"1986","unstructured":"O. Goldreich, S. Goldwasser and S. Micali, \u201cHow to construct random functions.\u201d Journal of the ACM, Vol. 33, No. 4, 210\u2013217 (1986).","journal-title":"Journal of the ACM"},{"issue":"2","key":"3_CR11","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"S. Goldwasser, S. Micali and R. Rivest, \u201cA digital signature scheme secure against adaptive chosen-message attacks,\u201d SIAM Journal of Computing, 17(2):281\u2013308, April 1988.","journal-title":"SIAM Journal of Computing"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, \u201cLFSR-based hashing and authentication.\u201d Advances in Cryptology \u2014 CRYPTO\u2019 94 Proceedings, Springer-Verlag, 129\u2013139 (1994).","DOI":"10.1007\/3-540-48658-5_15"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"M. Luby and C. Rackoff, \u201cHow to construct pseudorandom permutations from pseudorandom functions,\u201d SIAM J. Comput, Vol. 17, No. 2, April 1988.","DOI":"10.1137\/0217022"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"X. Lai, R. Rueppel and J. Woollven, \u201cA fast cryptographic checksum algorithm based on stream ciphers.\u201d Advances in Cryptology, Proceedings of AUSCRYPT 92. Springer-Verlag (1992).","DOI":"10.1007\/3-540-57220-1_73"},{"issue":"6","key":"3_CR15","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1145\/78973.78978","volume":"33","author":"P. Pearson","year":"1990","unstructured":"P. Pearson, \u201cFast hashing of variable-length text strings.\u201d Communications of the ACM, 33(6), 677\u2013680 (1990).","journal-title":"Communications of the ACM"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"R. Rivest, \u201cThe MD5 message digest algorithm.\u201d IETF RFC-1321 (1992).","DOI":"10.17487\/rfc1321"},{"key":"3_CR17","unstructured":"P. Rogaway, \u201cBucket hashing and its application to fast message authentication.\u201d (Full version of this paper.) Available from the author or out of http:\/\/www.cs.ucdavis.edu\/~rogaway\/"},{"key":"3_CR18","volume-title":"Contemporary Cryptography, The Science of Information Integrity","author":"G. Simmons","year":"1992","unstructured":"G. Simmons, \u201cA survey of information authentication.\u201d In Contemporary Cryptography, The Science of Information Integrity, G. Simmons, editor. IEEE Press, New York (1992)."},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/BF01388651","volume":"4","author":"D. Stinson","year":"1994","unstructured":"D. Stinson, \u201cUniversal hashing and authentication codes.\u201d Designs, Codes and Cryptography, vol. 4, 369\u2013380 (1994). Earlier version in Advances in Cryptology \u2014 CRYPTO\u2019 91 Proceedings, Springer-Verlag, 74\u201385 (1991).","journal-title":"Designs, Codes and Cryptography"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"R. Taylor, \u201cAn integrity check value algorithm for stream ciphers.\u201d Advances in Cryptology \u2014 CRYPTO\u2019 93 Proceedings, Springer-Verlag, 40\u201348 (1994).","DOI":"10.1007\/3-540-48329-2_4"},{"key":"3_CR21","unstructured":"J. Touch, \u201cPerformance analysis of MD 5.\u201d Manuscript, February 1995."},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"G. Tsudik, \u201cMessage authentication with one-way hash functions.\u201d Proceedings of Infocom 92, IEEE Press (1992)","DOI":"10.1109\/INFCOM.1992.263477"},{"key":"3_CR23","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. Wegman","year":"1981","unstructured":"M. Wegman and L. Carter, \u201cNew hash functions and their use in authentication and set equality.\u201d J. of Computer and System Sciences 22, 265\u2013279 (1981).","journal-title":"J. of Computer and System Sciences"},{"key":"3_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/3-540-58108-1_16","volume-title":"Fast Software Encryption, Cambridge Security Workshop, 1993 Proceedings","author":"D. Wheeler","year":"1994","unstructured":"D. Wheeler, \u201cA bulk data encryption algorithm.\u201d Fast Software Encryption, Cambridge Security Workshop, 1993 Proceedings, R. Anderson, ed., 127\u2013134. Lecture Notes in Computer Science, vol. 809, Springer-Verlag (1994)."},{"key":"3_CR25","unstructured":"A. Zobrist, \u201cA new hashing method with applications for game playing.\u201d University of Wisconsin, Dept. of Computer Science, TR #88 (April 1970)."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPT0\u2019 95"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44750-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T04:18:19Z","timestamp":1556770699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44750-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995]]},"ISBN":["9783540602217","9783540447504"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-44750-4_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1995]]}}}