Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes

Author(s):  
Yoshinori Ogawa ◽  
Shingo Sato ◽  
Junji Shikata ◽  
Hideki Imai
Author(s):  
Kannan Balasubramanian

Cryptographic Hash Functions are used to achieve a number of Security goals like Message Authentication, Message Integrity, and are also used to implement Digital Signatures (Non-repudiation), and Entity Authentication. This chapter discusses the construction of hash functions and the various attacks on the Hash functions. The Message Authentication Codes are similar to the Hash functions except that they require a key for producing the message digest or hash. Authenticated Encryption is a scheme that combines hashing and Encryption. The Various types of hash functions like one-way hash function, Collision Resistant hash function and Universal hash functions are also discussed in this chapter.


2014 ◽  
Vol 29 (1) ◽  
pp. 53-68 ◽  
Author(s):  
Zheng Gong ◽  
Pieter Hartel ◽  
Svetla Nikova ◽  
Shao-Hua Tang ◽  
Bo Zhu

Sign in / Sign up

Export Citation Format

Share Document