Fast authentication codes based on random polynomial residue classes

Valentin Afanassiev, Ben Smeets, Christian Gehrmann

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

The verification of the authenticity of a text document or a datafile is one of the main applications of cryptographic techniques. A common used technique for this purpose is the application of a message authentication code (MAC). Usually the MAC computation has to be done in software. Based on the relationship between error-correcting codes and so-called families of almost universal hash functions, and the error-correcting codes using polynomial residue classes we describe an efficient procedure for a MAC computation which is much faster than the standard MAC constructions using MD5 or SHA and uses much less key bits than the fast MACs based on bucket hashing.

Original languageEnglish
Title of host publicationProceedings 1997 IEEE International Symposium on Information Theory
PublisherIEEE - Institute of Electrical and Electronics Engineers Inc.
Pages175
Number of pages1
ISBN (Print)0780339568, 9780780339569
DOIs
Publication statusPublished - 1997
Event1997 IEEE International Symposium on Information Theory, ISIT 1997 - Ulm, Germany
Duration: 1997 Jun 291997 Jul 4

Publication series

NameIEEE International Symposium on Information Theory - Proceedings
ISSN (Print)2157-8095

Conference

Conference1997 IEEE International Symposium on Information Theory, ISIT 1997
Country/TerritoryGermany
CityUlm
Period1997/06/291997/07/04

Subject classification (UKÄ)

  • Communication Systems
  • Telecommunications

Fingerprint

Dive into the research topics of 'Fast authentication codes based on random polynomial residue classes'. Together they form a unique fingerprint.

Cite this