{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T22:32:35Z","timestamp":1766788355458},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341588"},{"type":"electronic","value":"9783642341595"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34159-5_7","type":"book-chapter","created":{"date-parts":[[2012,10,6]],"date-time":"2012-10-06T07:34:12Z","timestamp":1349508852000},"page":"99-108","source":"Crossref","is-referenced-by-count":11,"title":["New Universal Hash Functions"],"prefix":"10.1007","author":[{"given":"Aysajan","family":"Abidin","sequence":"first","affiliation":[]},{"given":"Jan-\u00c5ke","family":"Larsson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/3-540-68697-5_2","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"M. Atici","year":"1996","unstructured":"Atici, M., Stinson, D.R.: Universal Hashing and Multiple Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 16\u201330. Springer, Heidelberg (1996)"},{"key":"7_CR2","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proc. IEEE Int. Conf. Comput. Syst. Signal Process., Bangalore, India, pp. 175\u2013179 (1984)"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/3-540-48329-2_28","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"J. Bierbrauer","year":"1994","unstructured":"Bierbrauer, J., Johansson, T., Kabatianskii, G., Smeets, B.: On Families of Hash Functions via Geometric Codes and Concatenation. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 331\u2013342. Springer, Heidelberg (1994)"},{"key":"7_CR4","unstructured":"Black, J.: Message authentication codes. Ph.D. thesis, University of California Davis, USA (2000)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/3-540-48405-1_14","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"J. Black","year":"1999","unstructured":"Black, J., Halevi, S., Krawczyk, H., Krovetz, T., Rogaway, P.: UMAC: Fast and Secure Message Authentication. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 216\u2013233. Springer, Heidelberg (1999)"},{"key":"7_CR6","first-page":"65","volume":"2","author":"B. Boer den","year":"1993","unstructured":"den Boer, B.: A simple and key-economical unconditional authentication scheme. J. Comp. Sec.\u00a02, 65\u201372 (1993)","journal-title":"J. Comp. Sec."},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"L. Carter","year":"1979","unstructured":"Carter, L., Wegman, M.N.: Universal classes of hash functions. J. Comput. Syst. Sci.\u00a018, 143\u2013154 (1979)","journal-title":"J. Comput. Syst. Sci."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/BF02124750","volume":"5","author":"R.M. Corless","year":"1996","unstructured":"Corless, R.M., Gonnet, G.H., Hare, D.E.G., Jeffrey, D.J., Knuth, D.E.: On the Lambert W function. Adv. Comput. Math.\u00a05, 329\u2013359 (1996)","journal-title":"Adv. Comput. Math."},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/3-540-48329-2_30","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"P. Gemmell","year":"1994","unstructured":"Gemmell, P., Naor, M.: Codes for Interactive Authentication. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 355\u2013367. Springer, Heidelberg (1994)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0052345","volume-title":"Fast Software Encryption","author":"S. Halevi","year":"1997","unstructured":"Halevi, S., Krawczyk, H.: MMH: Software Message Authentication in the Gbit\/Second Rates. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 172\u2013189. Springer, Heidelberg (1997)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/3-540-69053-0_12","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"T. Johansson","year":"1997","unstructured":"Johansson, T.: Bucket Hashing with a Small Key Size. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 149\u2013162. Springer, Heidelberg (1997)"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/18.485725","volume":"42","author":"G. Kabatianskii","year":"1996","unstructured":"Kabatianskii, G., Smeets, B.J.M., Johansson, T.: On the cardinality of systematic authentication codes via error-correcting codes. IEEE Trans. Inf. Theory\u00a042, 566\u2013578 (1996)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"H. Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-Based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/3-540-49264-X_24","volume-title":"Advances in Cryptology - EUROCRYPT \u201995","author":"H. Krawczyk","year":"1995","unstructured":"Krawczyk, H.: New Hash Functions for Message Authentication. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.\u00a0921, pp. 301\u2013310. Springer, Heidelberg (1995)"},{"key":"7_CR15","first-page":"235","volume-title":"Proc. STOC 1990","author":"Y. Mansour","year":"1990","unstructured":"Mansour, Y., Nisan, N., Tiwari, P.: The computational complexity of universal hashing. In: Ortiz, H. (ed.) Proc. STOC 1990, pp. 235\u2013243. ACM, New York (1990)"},{"key":"7_CR16","unstructured":"Nguyen, L.H., Roscoe, A.W.: A new bound for t-wise almost universal hash functions. IACR Cryptology ePrint Archive, Report 2009\/153 (2009), \n                  \n                    http:\/\/eprint.iacr.org\/2009\/153"},{"key":"7_CR17","unstructured":"Preneel, B.: Analysis and design of cryptographic hash functions. Ph.D. thesis, Katholieke Universiteit Leuven, Belgium (1993)"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/3-540-44750-4_3","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"P. Rogaway","year":"1995","unstructured":"Rogaway, P.: Bucket Hashing and Its Application to Fast Message Authentication. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 29\u201342. Springer, Heidelberg (1995)"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett.\u00a085, 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/3-540-46766-1_5","volume-title":"Advances in Cryptology - CRYPTO \u201991","author":"D.R. Stinson","year":"1992","unstructured":"Stinson, D.R.: Universal Hashing and Authentication Codes. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol.\u00a0576, pp. 74\u201385. Springer, Heidelberg (1992)"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/S0022-0000(05)80007-8","volume":"48","author":"D.R. Stinson","year":"1994","unstructured":"Stinson, D.R.: Combinatorial techniques for universal hashing. J. Comput. Syst. Sci.\u00a048, 337\u2013346 (1994)","journal-title":"J. Comput. Syst. Sci."},{"key":"7_CR22","first-page":"7","volume":"114","author":"D.R. Stinson","year":"1996","unstructured":"Stinson, D.R.: On the connections between universal hashing, combinatorial designs and error-correcting codes. Congressus Numerantium\u00a0114, 7\u201327 (1996)","journal-title":"Congressus Numerantium"},{"key":"7_CR23","first-page":"3","volume":"42","author":"D.R. Stinson","year":"2002","unstructured":"Stinson, D.R.: Universal hash families and the leftover hash lemma, and applications to cryptography and computing. J. Combin. Math. Combin. Comput.\u00a042, 3\u201331 (2002)","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci.\u00a022, 265\u2013279 (1981)","journal-title":"J. Comput. Syst. Sci."}],"container-title":["Lecture Notes in Computer Science","Research in Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34159-5_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:46:32Z","timestamp":1620132392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34159-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341588","9783642341595"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34159-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}