{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:19:20Z","timestamp":1725488360884},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540629757"},{"type":"electronic","value":"9783540690535"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-69053-0_12","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:24:05Z","timestamp":1186363445000},"page":"149-162","source":"Crossref","is-referenced-by-count":14,"title":["Bucket Hashing with a Small Key Size"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Johansson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"V. Afanassiev, C. Gehrmann, B. Smeets, Fast message authentication using efficient polynomial evaluation, Proceedings of Fast Software Encryption Conference\u2019 97, to appear.","DOI":"10.1007\/BFb0052346"},{"key":"12_CR2","series-title":"Lect Notes Comput Sci","first-page":"1","volume-title":"Keying hash functions for message authentication","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, Lecture Notes in Computer Science 1109 (1996), 1\u201315 (CRYPTO\u2019 96)."},{"key":"12_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-44750-4_2","volume-title":"XOR MACs: New methods for message authentication","author":"M. Bellare","year":"1995","unstructured":"M. Bellare, R. Gu\u00e9rin, P. Rogaway, XOR MACs: New methods for message authentication, Lecture Notes in Computer Science 963 (1995), 15\u201328 (CRYPTO\u2019 95)."},{"key":"12_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/3-540-48658-5_32","volume-title":"The security of cipher block chaining","author":"M. Bellare","year":"1994","unstructured":"M. Bellare, J. Kilian, P. Rogaway, The security of cipher block chaining, Lecture Notes in Computer Science 839 (1994), 341\u2013358 (CRYPTO\u2019 94)."},{"key":"12_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/3-540-48329-2_28","volume-title":"On families of hash functions via geometric codes and concatenation","author":"J. Bierbrauer","year":"1994","unstructured":"J. Bierbrauer, T. Johansson, G. Kabatianskii, and B. Smeets, On families of hash functions via geometric codes and concatenation, Lecture Notes in Computer Science, 773 (1994), 331\u2013342 (CRYPTO\u2019 93)."},{"key":"12_CR6","first-page":"65","volume":"2","author":"B. Boer den","year":"1993","unstructured":"B. den Boer, A simple and key-economical unconditionally authentication scheme, Journal of Computer Security, 2 (1993), 65\u201371.","journal-title":"Journal of Computer Security"},{"key":"12_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/3-540-68697-5_23","volume-title":"Fast hashing on the Pentium","author":"A. Bosselaers","year":"1996","unstructured":"A. Bosselaers, R. Govaerts, J. Vandewalle, Fast hashing on the Pentium, Lecture Notes in Computer Science 1109 (1996), 298\u2013313 (CRYPTO\u2019 96)."},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J.L. Carter","year":"1979","unstructured":"J.L. Carter, M.N. Wegman, Universal classes of hash functions, J. Computer and System Sciences, 18 (1979), 143\u2013154.","journal-title":"J. Computer and System Sciences"},{"key":"12_CR9","unstructured":"H. Dobbertin, Cryptoanalysis of MD5 compress, presented at the rump session of EUROCRYPT\u201996."},{"key":"12_CR10","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E.N. Gilbert","year":"1974","unstructured":"E.N. Gilbert, F.J. MacWilliams, and N.J.A. Sloane, Codes which detect deception, Bell Syst. Tech. J., 53 (1974), 405\u2013424.","journal-title":"Bell Syst. Tech. J."},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"S. Halevi, H. Krawczyk, Software message authentication in the Gbit\/second rates, Proceedings of Fast Software Encryption Conference\u2019 97, to appear.","DOI":"10.1007\/BFb0052345"},{"key":"12_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/3-540-68697-5_3","volume-title":"Universal hash functions from exponential sums over finite fields and Galois rings","author":"T. Helleseth","year":"1996","unstructured":"T. Helleseth and T. Johansson, Universal hash functions from exponential sums over finite fields and Galois rings, Lecture Notes in Computer Science 1109 (1996), 31\u201344 (CRYPTO\u2019 96)."},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF01388561","volume":"4","author":"T. Johansson","year":"1994","unstructured":"T. Johansson, A shift register construction of unconditionally secure authentication codes, Designs, Codes and Cryptography, 4 (1994), 69\u201381.","journal-title":"Designs, Codes and Cryptography"},{"key":"12_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-48654-1","volume-title":"On the relation between A-codes and codes correcting independent errors","author":"T. Johansson","year":"1994","unstructured":"T. Johansson, G. Kabatianskii, B. Smeets, On the relation between A-codes and codes correcting independent errors, Lecture Notes in Computer Science, 765 (1994), 1\u201311 (EUROCRYPT\u201993)."},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/18.485725","volume":"42","author":"G. Kabatianskii","year":"1996","unstructured":"G. Kabatianskii, B. Smeets, and T. Johansson, On the cardinality of systematic authentication codes via error correcting codes, IEEE Trans. Inform. Theory, 42 (1996), 566\u2013578.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"12_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"LFSR-based hashing and authentication","author":"H. Krawczyk","year":"1994","unstructured":"H. Krawczyk, LFSR-based hashing and authentication, Lecture Notes in Computer Science, 839 (1994), 129\u2013139 (CRYPTO\u2019 94)."},{"key":"12_CR17","series-title":"Lect Notes Comput Sci","first-page":"140","volume-title":"New hash functions for message authentication","author":"H. Krawczyk","year":"1995","unstructured":"H. Krawczyk, New hash functions for message authentication, Lecture Notes in Computer Science, 921 (1995), 140\u2013149 (EUROCRYPT\u2019 95)."},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1002\/ett.4460050406","volume":"5","author":"B. Preneel","year":"1994","unstructured":"B. Preneel, Cryptographic hash functions, European Transactions on Telecommunications, 5 (1994), 431\u2013448.","journal-title":"European Transactions on Telecommunications"},{"key":"12_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-60590-8","volume-title":"MDx-MAC and building fast MACs from hash functions","author":"B. Preneel","year":"1995","unstructured":"B. Preneel, P. van Oorschot, MDx-MAC and building fast MACs from hash functions, Lecture Notes in Computer Science, 963 (1995), 1\u201314 (CRYPTO\u2019 95)."},{"key":"12_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/3-540-68339-9_3","volume-title":"On the security of two MAC algorithms","author":"B. Preneel","year":"1996","unstructured":"B. Preneel, P. van Oorschot, On the security of two MAC algorithms, Lecture Notes in Computer Science, 1070 (1996), 19\u201332 (EUROCRYPT\u2019 96)."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"R.L. Rivest, The MD5 message-digest algorithm, Request for Comments 1321, Internet Activities Board, Internet Privacy Task Force (1992).","DOI":"10.17487\/rfc1321"},{"key":"12_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-44750-4_3","volume-title":"Bucket hashing and its application to fast message authentication","author":"P. Rogaway","year":"1995","unstructured":"P. Rogaway, Bucket hashing and its application to fast message authentication, Lecture Notes in Computer Science, 963 (1995), 29\u201342 (CRYPTO\u2019 95)."},{"key":"12_CR23","unstructured":"B. Schneier, Applied Cryptography, John Wiley & Sons (1996)."},{"key":"12_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/3-540-68697-5_24","volume-title":"On fast and provably secure message authentication based on universal hashing","author":"V. Shoup","year":"1996","unstructured":"V. Shoup, On fast and provably secure message authentication based on universal hashing, Lecture Notes in Computer Science, 1109 (1996), 313\u2013328 (CRYPTO\u2019 96)."},{"key":"12_CR25","first-page":"413","volume":"34","author":"G.J. Simmons","year":"1992","unstructured":"G.J. Simmons, A game theory model of digital message authentication, Congr. Numer., 34 (1992), 413\u2013424.","journal-title":"Congr. Numer."},{"key":"12_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Authentication theory\/coding theory","author":"G.J. Simmons","year":"1985","unstructured":"G.J. Simmons, Authentication theory\/coding theory, in Lecture Notes in Computer Science, 196 (1985), 411\u2013431 (CRYPTO\u2019 84)."},{"key":"12_CR27","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/BF01388651","volume":"4","author":"D.R. Stinson","year":"1994","unstructured":"D.R. Stinson, Universal hashing and authentication codes, Codes, Designs and Cryptography, 4 (1994), 337\u2013346.","journal-title":"Codes, Designs and Cryptography"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, J. Computer and System Sciences, 22 (1981), 265\u2013279.","journal-title":"J. Computer and System Sciences"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201997"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-69053-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T19:32:14Z","timestamp":1556739134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-69053-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540629757","9783540690535"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/3-540-69053-0_12","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1997]]}}}