On families of hash functions via geometric codes and concatenation
In this paper we use coding theory to give simple explanations of some recent results on universal hashing. We first apply our approach to give a precise and elegant analysis of the Wegman-Carter construction for authentication codes. Using Reed-Solomon codes and the well known concept of concatenat...
Gespeichert in:
| Hauptverfasser: | , , , |
|---|---|
| Dokumenttyp: | Kapitel/Artikel Konferenzschrift |
| Sprache: | Englisch |
| Veröffentlicht: |
1994
|
| In: |
Advances in Cryptology — CRYPTO’ 93
Year: 1994, Pages: 331–342 |
| DOI: | 10.1007/3-540-48329-2_28 |
| Online-Zugang: | Verlag: https://dx.doi.org/10.1007/3-540-48329-2_28 |
| Verfasserangaben: | Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben Smeets |
MARC
| LEADER | 00000caa a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 1847406394 | ||
| 003 | DE-627 | ||
| 005 | 20230710182309.0 | ||
| 007 | cr uuu---uuuuu | ||
| 008 | 230605s1994 xx |||||o 00| ||eng c | ||
| 024 | 7 | |a 10.1007/3-540-48329-2_28 |2 doi | |
| 035 | |a (DE-627)1847406394 | ||
| 035 | |a (DE-599)KXP1847406394 | ||
| 035 | |a (OCoLC)1389826628 | ||
| 040 | |a DE-627 |b ger |c DE-627 |e rda | ||
| 041 | |a eng | ||
| 084 | |a 28 |2 sdnb | ||
| 100 | 1 | |a Bierbrauer, Jürgen |d 1948- |e VerfasserIn |0 (DE-588)143427210 |0 (DE-627)704484706 |0 (DE-576)171817583 |4 aut | |
| 245 | 1 | 0 | |a On families of hash functions via geometric codes and concatenation |c Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben Smeets |
| 264 | 1 | |c 1994 | |
| 300 | |a 12 | ||
| 336 | |a Text |b txt |2 rdacontent | ||
| 337 | |a Computermedien |b c |2 rdamedia | ||
| 338 | |a Online-Ressource |b cr |2 rdacarrier | ||
| 500 | |a Elektronische Reproduktion der Druck-Ausgabe 1. Januar 2001 | ||
| 500 | |a Gesehen am 05.06.2023 | ||
| 520 | |a In this paper we use coding theory to give simple explanations of some recent results on universal hashing. We first apply our approach to give a precise and elegant analysis of the Wegman-Carter construction for authentication codes. Using Reed-Solomon codes and the well known concept of concatenated codes we can then give some new constructions, which require much less key size than previously known constructions. The relation to coding theory allows the use of codes from algebraic curves for the construction of hash functions. Particularly, we show how codes derived from Artin-Schreier curves, Hermitian curves and Suzuki curves yield good classes of universal hash functions. | ||
| 650 | 4 | |a Algebraic Curf | |
| 650 | 4 | |a Authentication Code | |
| 650 | 4 | |a Hash Function | |
| 650 | 4 | |a Linear Code | |
| 650 | 4 | |a Orthogonal Array | |
| 700 | 1 | |a Johansson, Thomas B. |e VerfasserIn |0 (DE-588)170503348 |0 (DE-627)06060302X |0 (DE-576)131383833 |4 aut | |
| 700 | 1 | |a Kabatianskii, Gregory |e VerfasserIn |4 aut | |
| 700 | 1 | |a Smeets, Bermard Jan Marie |d 1956- |e VerfasserIn |0 (DE-588)1196639310 |0 (DE-627)1678468878 |4 aut | |
| 773 | 0 | 8 | |i Enthalten in |a Stinson, Douglas R., 1956 - |t Advances in Cryptology — CRYPTO’ 93 |d Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 1994 |g (1994), Seite 331–342 |h Online-Ressource |w (DE-627)1649304943 |w (DE-576)322906512 |z 9783540483298 |7 nnam |
| 773 | 1 | 8 | |g year:1994 |g pages:331–342 |g extent:12 |a On families of hash functions via geometric codes and concatenation |
| 856 | 4 | 0 | |u https://dx.doi.org/10.1007/3-540-48329-2_28 |x Verlag |
| 951 | |a AR | ||
| 992 | |a 20230605 | ||
| 993 | |a ConferencePaper | ||
| 994 | |a 1994 | ||
| 998 | |g 143427210 |a Bierbrauer, Jürgen |m 143427210:Bierbrauer, Jürgen |d 110000 |d 110100 |d 110000 |d 110400 |e 110000PB143427210 |e 110100PB143427210 |e 110000PB143427210 |e 110400PB143427210 |k 0/110000/ |k 1/110000/110100/ |k 0/110000/ |k 1/110000/110400/ |p 1 |x j | ||
| 999 | |a KXP-PPN1847406394 |e 4329365154 | ||
| BIB | |a Y | ||
| JSO | |a {"person":[{"given":"Jürgen","family":"Bierbrauer","role":"aut","display":"Bierbrauer, Jürgen","roleDisplay":"VerfasserIn"},{"given":"Thomas B.","family":"Johansson","role":"aut","display":"Johansson, Thomas B.","roleDisplay":"VerfasserIn"},{"roleDisplay":"VerfasserIn","display":"Kabatianskii, Gregory","role":"aut","family":"Kabatianskii","given":"Gregory"},{"roleDisplay":"VerfasserIn","display":"Smeets, Bermard Jan Marie","role":"aut","family":"Smeets","given":"Bermard Jan Marie"}],"title":[{"title":"On families of hash functions via geometric codes and concatenation","title_sort":"On families of hash functions via geometric codes and concatenation"}],"type":{"bibl":"chapter","media":"Online-Ressource"},"note":["Elektronische Reproduktion der Druck-Ausgabe 1. Januar 2001","Gesehen am 05.06.2023"],"language":["eng"],"recId":"1847406394","name":{"displayForm":["Jürgen Bierbrauer, Thomas Johansson, Gregory Kabatianskii, Ben Smeets"]},"origin":[{"dateIssuedKey":"1994","dateIssuedDisp":"1994"}],"id":{"eki":["1847406394"],"doi":["10.1007/3-540-48329-2_28"]},"physDesc":[{"extent":"12 S."}],"relHost":[{"type":{"bibl":"book","media":"Online-Ressource"},"note":["Literaturangaben"],"disp":"Stinson, Douglas R., 1956 - Advances in Cryptology — CRYPTO’ 93","recId":"1649304943","language":["eng"],"part":{"text":"(1994), Seite 331–342","extent":"12","year":"1994","pages":"331–342"},"person":[{"given":"Douglas R.","family":"Stinson","role":"aut","display":"Stinson, Douglas R."}],"title":[{"subtitle":"13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings","title":"Advances in Cryptology — CRYPTO’ 93","title_sort":"Advances in Cryptology — CRYPTO’ 93"}],"physDesc":[{"extent":"Online-Ressource"}],"relMultPart":[{"dispAlt":"Lecture notes in computer science","physDesc":[{"extent":"Online-Ressource"}],"origin":[{"dateIssuedDisp":"1973-","publisher":"Springer","dateIssuedKey":"1973","publisherPlace":"Berlin ; Heidelberg"}],"id":{"issn":["1611-3349"],"zdb":["2018930-8"],"eki":["316228877"]},"pubHistory":["1.1973 -"],"titleAlt":[{"title":"LNCS online"},{"title":"LNAI"},{"title":"Lecture notes in artificial intelligence"},{"title":"Lecture notes in bioinformatics"},{"title":"LNAI"},{"title":"LNBI"},{"title":"LNCS-LNAI"},{"title":"LNCS-LNBI"}],"part":{"number_sort":["773"],"number":["773"]},"type":{"media":"Online-Ressource","bibl":"serial"},"disp":"Lecture Notes in Computer Science","note":["Gesehen am 28.02.20","Das Gesamtwerk gliedert sich in: Lecture notes in artificial intelligence; Lecture notes in bioinformatics"],"recId":"316228877","language":["eng"],"title":[{"title_sort":"Lecture notes in computer science","title":"Lecture notes in computer science"}]}],"name":{"displayForm":["edited by Douglas R. Stinson"]},"origin":[{"publisherPlace":"Berlin, Heidelberg","publisher":"Springer-Verlag Berlin Heidelberg","dateIssuedKey":"1994","dateIssuedDisp":"1994"}],"id":{"isbn":["9783540483298"],"eki":["1649304943"],"doi":["10.1007/3-540-48329-2"]}}]} | ||
| SRT | |a BIERBRAUERONFAMILIES1994 | ||