“…Pagh and Pagh [42] showed that when the families H and G are of "high enough" independence, that is, roughly (c · log |S|)-wise independent, then the family PP(H, G, Π) is O(|S| −c )-indistinguishable from random by a |S|-query, non-adaptive distinguisher, where Π is the set of all functions from S to R. Note that the security of the resulting family goes well beyond the birthday attack barrier: it is indistinguishable from random by an attacker making |S| |S| queries. Aumüller et al [4] (building on the work of Dietzfelbinger and Woelfel [15]) strengthen the result of [42] by using more sophisticated hash functions H and G (rather than the O(log |S|)-wise independent that [42] used). Specifically, for a given s ≥ 0, Aumüller et al [4] constructed a function family ADW s (H, G, Π) that is O(|S| −(s+1) )-indistinguishable from random by a |S|-query, non-adaptive distinguisher, where Π is the set of all functions from S to R. 2 The idea to use more sophisticated hash functions, in the sense that they require less combinatorial work, already appeared in previous works, e.g., the work of Arbitman et al [2, §5.4].…”