{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:35:40Z","timestamp":1770744940830,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540663478","type":"print"},{"value":"9783540484059","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48405-1_14","type":"book-chapter","created":{"date-parts":[[2007,5,1]],"date-time":"2007-05-01T10:24:36Z","timestamp":1178015076000},"page":"216-233","source":"Crossref","is-referenced-by-count":175,"title":["UMAC: Fast and Secure Message Authentication"],"prefix":"10.1007","author":[{"given":"J.","family":"Black","sequence":"first","affiliation":[]},{"given":"S.","family":"Halevi","sequence":"additional","affiliation":[]},{"given":"H.","family":"Krawczyk","sequence":"additional","affiliation":[]},{"given":"T.","family":"Krovetz","sequence":"additional","affiliation":[]},{"given":"P.","family":"Rogaway","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,12,16]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/BFb0052346","volume":"1267","author":"V. Afanassiev","year":"1997","unstructured":"Afanassiev, V., Gehrmann, C., and Smeets, B. Fast message authentication using efficient polynomial evaluation. In Proceedings of the 4th Workshop on Fast Software Encryption (1997), vol. 1267, Springer-Verlag, pp. 190\u2013204.","journal-title":"Proceedings of the 4th Workshop on Fast Software Encryption"},{"key":"14_CR2","unstructured":"Ansi X9.9. American national standard \u2014 Financial institution message authentication (wholesale). ASC X9 Secretariat-American Bankers Association, 1986."},{"key":"14_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-68697-5_1","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., and Krawczyk, H. Keying hash functions for message authentication. In Advances in Cryptology-CRYPTO\u2019 96 (1996), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp. 1\u201315."},{"key":"14_CR4","unstructured":"Bellare, M., Canetti, R., and Krawczyk, H. Pseudorandom functions revisited: The cascade construction. In 37th Annual Symposium on Foundations of Computer Science (1996), IEEE Computer Society, pp. 514\u2013523."},{"key":"14_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"Advances in Cryptology-CRYPTO\u2019 94","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Kilian, J., and Rogaway, P. The security of cipher block chaining. In Advances in Cryptology-CRYPTO\u2019 94 (1994), vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, pp. 341\u2013358."},{"key":"14_CR6","unstructured":"Bernstein, D. Guaranteed message authentication faster than MD5. Unpublished manuscript, 1999."},{"key":"14_CR7","unstructured":"Black, J., Halevi, S., Hevia, A., Krawczyk, H., Krovetz, T., and Rogaway, P. UMAC \u2014 Message authentication code using universal hashing. Unpublished specification, http:\/\/www.cs.ucdavis.edu\/~rogaway\/umac , 1999."},{"key":"14_CR8","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology-CRYPTO\u2019 99","author":"J. Black","year":"1999","unstructured":"Black, J., Halevi, S., Krawczyk, H., Krovetz, T., and Rogaway, P. UMAC: Fast and secure message authentication. In Advances in Cryptology-CRYPTO\u2019 99 (1999), Lecture Notes in Computer Science, Springer-Verlag. Full version of this paper, available at http:\/\/www.cs.ucdavis.edu\/~rogaway\/umac ."},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Brassard, G. On computationally secure authentication tags requiring short secret shared keys. In Advances in Cryptology-CRYPTO\u2019 82 (1983), Springer-Verlag, pp. 79\u201386.","DOI":"10.1007\/978-1-4757-0602-4_7"},{"key":"14_CR10","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"Carter, L., and Wegman, M. Universal hash functions. J. of Computer and System Sciences, 18 (1979), 143\u2013154.","journal-title":"J. of Computer and System Sciences"},{"key":"14_CR11","unstructured":"FIPS 180-1. Secure hash standard. NIST, US Dept. of Commerce, 1995."},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. B., and Canetti, R. HMAC: Keyed hashing for message authentication. IETF RFC-2104, 1997.","DOI":"10.17487\/rfc2104"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0052345","volume":"1267","author":"S. Halevi","year":"1997","unstructured":"Halevi, S., and Krawczyk, H. MMH: Software message authentication in the Gbit\/second rates. In Proceedings of the 4th Workshop on Fast Software Encryption (1997), vol. 1267, Springer-Verlag, pp. 172\u2013189.","journal-title":"Proceedings of the 4th Workshop on Fast Software Encryption"},{"key":"14_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0000458","volume-title":"Advances in Cryptology-EUROCRYPT\u2019 97","author":"T. Johansson","year":"1997","unstructured":"Johansson, T. Bucket hashing with small key size. In Advances in Cryptology-EUROCRYPT\u2019 97 (1997), Lecture Notes in Computer Science, Springer-Verlag."},{"key":"14_CR15","unstructured":"Kaliski, B., and Robshaw, M. Message authentication with MD5, 1995. Technical newsletter of RSA Laboratories."},{"key":"14_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology-CRYPTO\u2019 94","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H. LFSR-based hashing and authentication. In Advances in Cryptology-CRYPTO\u2019 94 (1994), vol. 839 of Lecture Notes in Computer Science, Springer-Verlag, pp. 129\u2013139."},{"key":"14_CR17","unstructured":"Krovetz, T. UMAC reference code (in ANSI C with Pentium assembly). Available from http:\/\/www.cs.ucdavis.edu\/~rogaway\/umac , 1999."},{"key":"14_CR18","unstructured":"Mansour, Y., Nissan, N., and Tiwari, P. The computational complexity of universal hashing. In Proceedings of the Twenty Second Annual ACM Symposium on Theory of Computing (1990), ACM Press, pp. 235\u2013243."},{"key":"14_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/3-540-48910-X_3","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 99","author":"W. Nevelsteen","year":"1999","unstructured":"Nevelsteen, W., and Preneel, B. Software performance of universal hash functions. In Advances in Cryptology \u2014 EUROCRYPT\u2019 99 (1999), vol. 1592 of Lecture Notes in Computer Science, Springer-Verlag, pp. 24\u201341."},{"key":"14_CR20","series-title":"Lect Notes Comput Sci","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"S. Patel","year":"1999","unstructured":"Patel, S., and Ramzan, Z. Square hash: Fast message authentication via optimized universal hash functions. In Advances in Cryptology \u2014 CRYPTO\u2019 99 (1999), Lecture Notes in Computer Science, Springer-Verlag."},{"key":"14_CR21","unstructured":"Petrank, E., and Rackoff, C. CBC MAC for real-time data sources. Manuscript 97-10 in http:\/\/philby.ucsd.edu\/cryptolib.html , 1997."},{"key":"14_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-60590-8","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 95","author":"B. Preneel","year":"1995","unstructured":"Preneel, B., and van Oorschot, P. MDx-MAC and building fast MACs from hash functions. In Advances in Cryptology \u2014 CRYPTO\u2019 95 (1995), vol. 963 of Lecture Notes in Computer Science, Springer-Verlag, pp. 1\u201314."},{"key":"14_CR23","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-68339-9_3","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u2019 96","author":"B. Preneel","year":"1996","unstructured":"Preneel, B., and van Oorschot, P. On the security of two MAC algorithms. In Advances in Cryptology \u2014 EUROCRYPT\u2019 96 (1996), vol. 1070 of Lecture Notes in Computer Science, Springer-Verlag, pp. 19\u201332."},{"key":"14_CR24","unstructured":"Rivest, R., Robshaw, M., Sidney, R., and Yin, Y. The RC6 block cipher. Available from http:\/\/theory.lcs.mit.edu\/~rivest\/publications.html , 1998."},{"key":"14_CR25","series-title":"Lect Notes Comput Sci","first-page":"313","volume-title":"Advances in Cryptology-CRYPTO\u2019 95","author":"P. Rogaway","year":"1995","unstructured":"Rogaway, P. Bucket hashing and its application to fast message authentication. In Advances in Cryptology-CRYPTO\u2019 95 (1995), vol. 963 of Lecture Notes in Computer Science, Springer-Verlag, pp. 313\u2013328."},{"key":"14_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/3-540-68697-5_24","volume-title":"Advances in Cryptology-CRYPTO\u2019 96","author":"V. Shoup","year":"1996","unstructured":"Shoup, V. On fast and provably secure message authentication based on universal hashing. In Advances in Cryptology-CRYPTO\u2019 96 (1996), vol. 1109 of Lecture Notes in Computer Science, Springer-Verlag, pp. 74\u201385."},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Tsudik, G. Message authentication with one-way hash functions. In Proceedings of Infocom\u2019 92 (1992), IEEE Press.","DOI":"10.1109\/INFCOM.1992.263477"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M. Wegman","year":"1981","unstructured":"Wegman, M., and Carter, L. New hash functions and their use in authentication and set equality. In J. of Comp. and System Sciences (1981), vol. 22, pp. 265\u2013279.","journal-title":"J. of Comp. and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 99"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48405-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T16:35:47Z","timestamp":1556382947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48405-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663478","9783540484059"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-48405-1_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[1999]]}}}