2005
DOI: 10.1007/11496137_13
|View full text |Cite
|
Sign up to set email alerts
|

Badger – A Fast and Provably Secure MAC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(19 citation statements)
references
References 18 publications
0
19
0
Order By: Relevance
“…Boesgaard et al [10] showed that an ǫ-AXU family of hash functions can be reduced to a family of ǫ-AU hash functions by the following theorem:…”
Section: Notions For Universal Hash Functionsmentioning
confidence: 99%
“…Boesgaard et al [10] showed that an ǫ-AXU family of hash functions can be reduced to a family of ǫ-AU hash functions by the following theorem:…”
Section: Notions For Universal Hash Functionsmentioning
confidence: 99%
“…The pseudo dot-product [46] based hash PDP (e.g. NMH hash [14], NMH * [14], NH [4] and others [8,21]) defined as (for even )…”
Section: Our Contribution and Outline Of The Papermentioning
confidence: 99%
“…NMH * and NH are variants of these construction. Later on NH has been modified to propose some more constructions [19,21,8,31]. A general form of pseudo dot-product PDP is (…”
Section: Pseudo Dot-productmentioning
confidence: 99%
“…This is the case with high-speed message authentication and the move from 32-bit to 64-bit architectures. The fastest reported software-optimized message authentication algorithms (or MACs) are all designed to run well on 32-bit architectures [5,6,9]. While these MACs generally work equally well on both 32-and 64-bit architectures -because the newer architectures support older instructions at full speed -they are not designed to take advantage of new capabilities found in 64-bit processors.…”
Section: Introductionmentioning
confidence: 99%
“…Message authentication is used when parties wish to communicate with assurance that received messages come from the claimed sender without alteration. All of the fastest MACs follow principles developed by Wegman and Carter [3,5,6,7,9,14]. The basic Wegman-Carter message authentication paradigm is for the sender first to hash the message with a hash function known only to himself and the receiver.…”
Section: Introductionmentioning
confidence: 99%