-
1Academic Journal
المؤلفون: Chen, Lijie, Li, Jiatu, Yang, Tianqi
المساهمون: Lijie Chen and Jiatu Li and Tianqi Yang
مصطلحات موضوعية: Almost universal hash functions, hardness magnification, pseudorandom functions
وصف الملف: application/pdf
Relation: Is Part Of LIPIcs, Volume 234, 37th Computational Complexity Conference (CCC 2022); https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.CCC.2022.23
-
2Conference
المؤلفون: Duval, Sébastien, Leurent, Gaëtan
المساهمون: Security, Cryptology and Transmissions (SECRET), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Université Catholique de Louvain = Catholic University of Louvain (UCL), The work of Sébastien Duval has been funded in partsby the European Commission through the H2020 project 731591 (acronym RE-ASSURE)
المصدر: Lecture Notes in Computer Science ; CARDIS 2019 - 18th Smart Card Research and Advanced Application Conference ; https://inria.hal.science/hal-02424904 ; CARDIS 2019 - 18th Smart Card Research and Advanced Application Conference, Nov 2019, Prague, Czech Republic. pp.195-215, ⟨10.1007/978-3-030-42068-0_12⟩
مصطلحات موضوعية: Lightweight cryptography, Micro-controller, MAC, Al-most Universal hash functions, Beyond-birthday-bound security, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
جغرافية الموضوع: Prague, Czech Republic
-
3
المؤلفون: Abidin, Aysajan, Larsson, Jan-Åke
المصدر: ICG QC Quantum Information Processing. 13(10):2155-2170
مصطلحات موضوعية: Authentication, Strongly Universal hash functions, Partially known key, Trace distance, Universal Composability, Quantum Key Distribution.
وصف الملف: electronic
-
4
المؤلفون: Ågren, Martin, Hell, Martin, Johansson, Thomas
المساهمون: Kellenberger, Patrick, Editor
المصدر: LightSec 2011,Istanbul, Turkey,-- 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications ELLIIT: the Linköping-Lund initiative on IT and mobile communication. :26-33
مصطلحات موضوعية: Message Authentication Codes, Universal Hash Functions, RFID, Teknik, Elektroteknik och elektronik, Engineering and Technology, Electrical Engineering, Electronic Engineering, Information Engineering
وصف الملف: electronic
-
5Conference
المؤلفون: Yamamura, Akihiro
المساهمون: Akita University, David Hutchison, Takeo Kanade, Bernhard Steffen, Demetri Terzopoulos, Doug Tygar, Gerhard Weikum, Linawati, Made Sudiana Mahendra, Erich J. Neuhold, A Min Tjoa, Ilsun You, Josef Kittler, Jon M. Kleinberg, Alfred Kobsa, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, TC 5, TC 8
المصدر: Lecture Notes in Computer Science ; 2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia) ; https://hal.inria.fr/hal-01397269 ; 2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.554-563, ⟨10.1007/978-3-642-55032-4_57⟩
مصطلحات موضوعية: Conjugacy Search Problem, DDH Assumption, Monoid Action, Universal Hash Functions, Leftover Hash Lemma, [INFO]Computer Science [cs], [SHS.INFO]Humanities and Social Sciences/Library and information sciences
Relation: hal-01397269; https://hal.inria.fr/hal-01397269; https://hal.inria.fr/hal-01397269/document; https://hal.inria.fr/hal-01397269/file/978-3-642-55032-4_57_Chapter.pdf
-
6
المؤلفون: Shai Halevi, Craig Gentry, Adi Akavia, Max Leibovich
المصدر: Proceedings on Privacy Enhancing Technologies, Vol 2019, Iss 3, Pp 87-107 (2019)
مصطلحات موضوعية: Ethics, 0303 health sciences, business.industry, Computer science, randomized algorithms, Information technology, QA75.5-76.95, fully homomorphic encryption, Encryption, secure search, BJ1-1725, 03 medical and health sciences, 0302 clinical medicine, 030220 oncology & carcinogenesis, Electronic computers. Computer science, General Earth and Planetary Sciences, universal hash functions, business, Computer hardware, 030304 developmental biology, General Environmental Science
-
7
المؤلفون: Ågren, Martin, Hell, Martin, Johansson, Thomas
المصدر: ELLIIT: the Linköping-Lund initiative on IT and mobile communication.
مصطلحات موضوعية: Message Authentication Codes, Universal Hash Functions, Hardware Implementation, Lightweight, Stream Cipher, Teknik, Elektroteknik och elektronik, Engineering and Technology, Electrical Engineering, Electronic Engineering, Information Engineering
وصف الملف: electronic
-
8Academic Journal
المؤلفون: Apavatjrut, Anya, Znaidi, Wassim, Fraboulet, Antoine, Goursaud, Claire, Jaffrès-Runser, Katia, Lauradoux, Cédric, Minier, Marine
المساهمون: Smart Wireless Networking (SWING), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-CITI Centre of Innovation in Telecommunications and Integration of services (CITI), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA), Ambient Middleware Architectures: Service-Oriented, Networked, Efficient and Secured (AMAZONES)
المصدر: ISSN: 1532-0626 ; EISSN: 1532-0634.
مصطلحات موضوعية: Xor Network Coding, Pollution Attack, Denial of Services, MAC, Trees, Linear Universal Hash Functions, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
Relation: hal-00644484; https://inria.hal.science/hal-00644484; https://inria.hal.science/hal-00644484/document; https://inria.hal.science/hal-00644484/file/CCPE-FINAL.pdf
-
9Academic Journal
المؤلفون: А.А. Кузнецов, О.Г. Король, В.В. Босько, О.О. Кузнецов, A.A. Kuznetsov, O.G. Korol’, V.V. Bos'ko
المصدر: Системи обробки інформації. — 2011. — № 3(93). 117-125 ; Системы обработки информации. — 2011. — № 3(93). 117-125 ; Information Processing Systems. — 2011. — № 3(93). 117-125 ; 1681-7710
مصطلحات موضوعية: Захист інформації, УДК 681.3.06, МАС-коды, универсальные хеш-функции, модель UMAC, коллизионные свойства, МАС-коди, універсальні геш-функції, колізійні властивості, COLOR-codes, universal hash-functions, model UMAC, conflict characteristic
وصف الملف: application/pdf
-
10Academic Journal
المؤلفون: M. Bellare, A. Boldyreva, L. Knudsen, C. Namprempre
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Ciphers, pseudorandom permutations, universal hash functions
وصف الملف: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.81.1258; http://eprint.iacr.org/2007/197.ps.gz
-
11Academic Journal
المؤلفون: Jun Xu, Mukesh Singhal, Joanne Degroat
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Packet Classication, Route Caching, Set-Associative Cache, Parallel Hashing, Universal Hash Functions
وصف الملف: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.7294; http://www.ieee-infocom.org/2000/papers/184.ps
-
12
المؤلفون: Abidin, Aysajan, 1983, Aly, Abdelrahaman, Rua, Enrique Argones, Mitrokotsa, Aikaterini, 1978
المصدر: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10052 LNCS:284-298
مصطلحات موضوعية: Template privacy and security, Universal hash functions, Homomorphic encryption, Verifiable computation, Biometric authentication
URL الوصول: https://research.chalmers.se/publication/245547
-
13
المؤلفون: Maciej Skorski, Maciej Obremski
المصدر: ISIT
Obremski, M & Skorski, M 2018, Inverted Leftover Hash Lemma . in 2018 IEEE International Symposium on Information Theory, ISIT 2018 . vol. 2018-June, 8437654, IEEE, pp. 1834-1838, 2018 IEEE International Symposium on Information Theory, ISIT 2018, Vail, United States, 17/06/2018 . https://doi.org/10.1109/ISIT.2018.8437654
2018 IEEE International Symposium on Information Theory (ISIT)مصطلحات موضوعية: Discrete mathematics, Universal Hash Functions, Universal hashing, Computer science, business.industry, Leftover hash lemma, TheoryofComputation_GENERAL, 020206 networking & telecommunications, Cryptography, Data_CODINGANDINFORMATIONTHEORY, 0102 computer and information sciences, 02 engineering and technology, Min-Entropy Extractors, 16. Peace & justice, 01 natural sciences, Extractor, Extremal graph theory, 010201 computation theory & mathematics, Extremal Graph Theory, 0202 electrical engineering, electronic engineering, information engineering, business, Randomness
-
14
المؤلفون: Ågren, Martin, Hell, Martin, Johansson, Thomas
المصدر: IET Information Security ELLIIT: the Linköping-Lund initiative on IT and mobile communication. 6(4):329-336
مصطلحات موضوعية: Message Authentication Codes, Universal Hash Functions, Teknik, Elektroteknik och elektronik, Engineering and Technology, Electrical Engineering, Electronic Engineering, Information Engineering
URL الوصول: https://lup.lub.lu.se/record/2629326
-
15Academic Journal
المؤلفون: Khiabani, Yahya S., Wei, Shuangqing
المصدر: Faculty Publications
مصطلحات موضوعية: Equivocation, L norm distance 1, Randomness extractor, Rényi entropy, Secrecy exponent, Universal hash functions 2
-
16
المؤلفون: Jinshu Su, Wanrong Yu, Bo Liu, Baokang Zhao, Ilsun You, Francesco Palmieri, Chunqing Wu
مصطلحات موضوعية: quantum key distribution (QKD), Theoretical computer science, Computer science, 10-GHz QKD system, Authentication, number-theoretic transforms (NTT), security, universal hash functions, Electrical and Electronic Engineering, Control and Systems Engineering, Computer Science Applications1707 Computer Vision and Pattern Recognition, Hash function, 02 engineering and technology, Quantum key distribution, Secure Hash Standard, 020210 optoelectronics & photonics, SHA-2, 0202 electrical engineering, electronic engineering, information engineering, Cryptographic hash function, Security of cryptographic hash functions, Data Authentication Algorithm, Secure Hash Algorithm, Key generation, business.industry, SWIFFT, 020206 networking & telecommunications, Hash-based message authentication code, Quantum cryptography, Hash chain, Challenge–response authentication, business, Computer network
-
17Conference
المؤلفون: Anya, Apavatjrut, Znaidi, Wassim, Fraboulet, Antoine, Goursaud, Claire, Lauradoux, Cédric, Minier, Marine
المساهمون: Smart Wireless Networking (SWING), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-CITI Centre of Innovation in Telecommunications and Integration of services (CITI), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA), Ambient Middleware Architectures: Service-Oriented, Networked, Efficient and Secured (AMAZONES), IEEE
المصدر: International Conference on Network and System Security - NSS 2010 ; https://hal.science/hal-00527399 ; International Conference on Network and System Security - NSS 2010, Sep 2010, Melbourne, Australia. pp.1-8
مصطلحات موضوعية: universal hash functions, Xor network coding, pollution attack, homomorphic MAC, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
الاتاحة: https://hal.science/hal-00527399
-
18
المؤلفون: Afanassiev, Valentine, Gehrmann, Christian, Smeets, Ben
المساهمون: Biham, Eli, Editor
المصدر: 4th International Workshop on Fast Software Encryption, FSE 1997,Haifa, Israel,-- Fast Software Encryption : 4th International Workshop, FSE 1997, Proceedings - 4th International Workshop, FSE 1997, Proceedings. 1267:190-204
مصطلحات موضوعية: Message authentication, Polynomial evaluation, Software MAC generation, Universal hash functions, Naturvetenskap, Data- och informationsvetenskap (Datateknik), Datavetenskap (datalogi), Natural Sciences, Computer and Information Science, Computer Science
URL الوصول: https://lup.lub.lu.se/record/9976cc15-0190-46aa-846b-94984d9855df
http://dx.doi.org/10.1007/bfb0052346 -
19
المؤلفون: Johansson, Thomas
المصدر: nternational Conference on the Theory and Application of Cryptographic Techniques EUROCRYPT ’97,Konstanz, Germany,-- Advances in Cryptology / Lecture Notes in Computer Science. 1233:149-162
مصطلحات موضوعية: bucket hashing, authentication codes, Universal hash functions, message authentication, software implementations, Teknik, Elektroteknik och elektronik, Engineering and Technology, Electrical Engineering, Electronic Engineering, Information Engineering
-
20
المؤلفون: Helleseth, Tor, Johansson, Thomas
المصدر: 16th Annual International Cryptology Conference CRYPTO ’96,-- Advances in Cryptology / Lecture Notes in Computer Science. 1109:31-44
مصطلحات موضوعية: exponential sums, Universal hash functions, authentication codes, Galois rings, Teknik, Elektroteknik och elektronik, Engineering and Technology, Electrical Engineering, Electronic Engineering, Information Engineering