{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T16:45:01Z","timestamp":1773938701067,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540551881","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_5","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"74-85","source":"Crossref","is-referenced-by-count":86,"title":["Universal hashing and authentication codes"],"prefix":"10.1007","author":[{"given":"D. R.","family":"Stinson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. L. Carter","year":"1979","unstructured":"J. L. Carter and M. N. Wegman. Universal classes of hash functions, J. Comput. System Sci. 18 (1979), 143\u2013154.","journal-title":"J. Comput. System Sci."},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1093\/biomet\/33.4.305","volume":"33","author":"R. L. Plackett","year":"1945","unstructured":"R. L. Plackett and J. P. Burman. The design of optimum multi-factorial experiments, Biometrika 33 (1945), 305\u2013325.","journal-title":"Biometrika"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/0020-0190(80)90122-2","volume":"10","author":"D. V. Sarwate","year":"1980","unstructured":"D. V. Sarwate. A note on universal classes of hash functions, Inform. Proc. Letters 10 (1980), 41\u201345.","journal-title":"Inform. Proc. Letters"},{"key":"5_CR4","first-page":"161","volume":"45","author":"G. J. Simmons","year":"1984","unstructured":"G. J. Simmons. Message authentication: a game on hypergraphs, Congr. Numer. 45 (1984), 161\u2013192.","journal-title":"Congr. Numer."},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/5.4445","volume":"76","author":"G. J. Simmons","year":"1988","unstructured":"G. J. Simmons. A survey of information authentication, Proc. of the IEEE 76 (1988), 603\u2013620.","journal-title":"Proc. of the IEEE"},{"key":"5_CR6","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","volume":"1","author":"D. R. Stinson","year":"1988","unstructured":"D. R. Stinson. Some constructions and bounds for authentication codes, J. Cryptology 1 (1988), 37\u201351.","journal-title":"J. Cryptology"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D. R. Stinson","year":"1990","unstructured":"D. R. Stinson. The combinatorics of authentication and secrecy codes, J. Cryptology 2 (1990), 23\u201349.","journal-title":"J. Cryptology"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"D. R. Stinson. Combinatorial techniques for universal hashing, submitted to J. Comput. System Sci.","DOI":"10.1016\/S0022-0000(05)80007-8"},{"key":"5_CR9","unstructured":"D. R. Stinson. Combinatorial characterizations of authentication codes, submitted to Designs, Codes and Cryptography (a preliminary version appears elsewhere in these proceedings)."},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. N. Wegman","year":"1981","unstructured":"M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality, J. Comput. System Sci. 22 (1981), 265\u2013279.","journal-title":"J. Comput. System Sci."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:36Z","timestamp":1605647616000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_5","relation":{},"subject":[]}}