{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T05:40:46Z","timestamp":1774590046898,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319097039","type":"print"},{"value":"9783319097046","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09704-6_5","type":"book-chapter","created":{"date-parts":[[2014,7,11]],"date-time":"2014-07-11T09:43:21Z","timestamp":1405071801000},"page":"42-52","source":"Crossref","is-referenced-by-count":2,"title":["Quantum Hashing via \u03b5-Universal Hashing Constructions and Freivalds\u2019 Fingerprinting Schemas"],"prefix":"10.1007","author":[{"given":"Farid","family":"Ablayev","sequence":"first","affiliation":[]},{"given":"Marat","family":"Ablayev","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Ablayev, F., Vasiliev, A.: Algorithms for quantum branching programs based on fingerprinting. In: Proceedings Fifth Workshop on Developments in Computational Models\u2013Computational Models From Nature, DCM 2009, Rhodes, Greece, vol.\u00a09, pp. 1\u201311 (July 11, 2009)"},{"key":"5_CR2","unstructured":"Ablayev, F., Vasiliev, A.: Quantum Hashing, arXiv:1310.4922 (quant-ph) (2013)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Ablayev, F., Vasiliev, A.: Cryptographic quantum hashing. Laser Physics Letters\u00a011(2), 025202 (2014)","DOI":"10.1088\/1612-2011\/11\/2\/025202"},{"key":"5_CR4","unstructured":"Ablayev, F., Ablayev, M.: Quantum Hashing via Classical \u03b5-universal Hashing Constructions, arXiv:1404.1503 (quant-ph) (2014)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Bierbrauer, J., Johansson, T., Kabatianskii, G.A., Smeets, B.J.M.: On Families of Hash Functions via Geometric Codes and Concatenation. In: Stinson, D.R. (ed.) Advances in Cryptology - CRYPTO 1993. LNCS, vol.\u00a0773, pp. 331\u2013342. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-48329-2_28"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"167902","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H. Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett.\u00a087, 167902 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"J. Carter","year":"1979","unstructured":"Carter, J., Wegman, M.: Universal Classes of Hash Functions. J. Computer and System Sciences\u00a018, 143\u2013154 (1979)","journal-title":"J. Computer and System Sciences"},{"issue":"7-8","key":"5_CR8","doi-asserted-by":"crossref","first-page":"583","DOI":"10.26421\/QIC13.7-8-3","volume":"13","author":"D. Gavinsky","year":"2013","unstructured":"Gavinsky, D., Ito, T.: Quantum fingerprints that keep secrets. Quantum Information & Computation\u00a013(7-8), 583\u2013606 (2013)","journal-title":"Quantum Information & Computation"},{"key":"5_CR9","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures, T echnical report (2001), http:\/\/arxiv.org\/abs\/quant-ph\/0105032"},{"key":"5_CR10","unstructured":"Freivalds, R.: Probabilistic Machines Can Use Less Running Time. In: Proceedings of the IFIP Congress 1977, Toronto, Canada, vol.\u00a01977, pp. 839\u2013842. North-Holland (1977)"},{"key":"5_CR11","unstructured":"Montanaro, A., Osborne, T.: Quantum Boolean functions. Chicago Journal of Theoretical Computer Science 1, arXiv:0810.2435 (2010)"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1017\/S0963548300000870","volume":"2","author":"A. Razborov","year":"1993","unstructured":"Razborov, A., Szemeredi, E., Wigderson, A.: Constructing small sets that are uniform in arithmetic progressions. Combinatorics, Probability & Computing\u00a02, 513\u2013518 (1993)","journal-title":"Combinatorics, Probability & Computing"},{"key":"5_CR13","first-page":"7","volume":"114","author":"D.R. Stinson","year":"1996","unstructured":"Stinson, D.R.: On the connections between universal \u03b5-hashing, combinatorial designs and error-correcting codes. Congressus Numerantium\u00a0114, 7\u201327 (1996)","journal-title":"Congressus Numerantium"},{"key":"5_CR14","first-page":"3","volume":"42","author":"D.R. Stinson","year":"2002","unstructured":"Stinson, D.R.: Universal hash families and the leftover hash lemma, and applications to cryptography and computing. Journal of Combinatorial Mathematics and Combinatorial Computing\u00a042, 3\u201331 (2002)","journal-title":"Journal of Combinatorial Mathematics and Combinatorial Computing"},{"key":"5_CR15","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Discrete Mathematics and Its Applications. CRC Press (2005)"},{"key":"5_CR16","unstructured":"Wigderson, A.: Lectures on the Fusion Method and Derandomization. Technical Report SOCS-95. 2, School of Computer Science, McGill University (file\/pub\/tech-reports\/library\/reports\/95\/TR95.2.ps.gz at the anonymousftpsiteftp.cs.mcgill.ca"}],"container-title":["Lecture Notes in Computer Science","Descriptional Complexity of Formal Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09704-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T23:16:52Z","timestamp":1649632612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09704-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097039","9783319097046"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09704-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}