Sciweavers

Share
CRYPTO   1995 Advances in Cryptology
Wall of Fame | Most Viewed CRYPTO-1995 Paper
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
11 years 9 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source140
2Download preprint from source135
3Download preprint from source118
4Download preprint from source111
5Download preprint from source101
6Download preprint from source100
7Download preprint from source93
8Download preprint from source91
9Download preprint from source89
books