Universal hash functions from exponential sums over finite fields and Galois rings

Tor Helleseth, Thomas Johansson

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

In this paper new families of strongly universal hash functions, or equivalently, authentication codes, are proposed. Their parameters are derived from bounds on exponential sums over finite fields and Galois rings. This is the first time hash families based upon such exponential sums have been considered. Their performance improves the previously best known constructions and they can be made general in their choice of parameters. Furthermore, the constructions are suitable both for hardware and software implementations. The latter is an aspect that is significant and has been considered in several recent papers.
Original languageEnglish
Title of host publicationAdvances in Cryptology / Lecture Notes in Computer Science
PublisherSpringer
Pages31-44
Volume1109
ISBN (Print)978-3-540-61512-5
DOIs
Publication statusPublished - 1996
Event16th Annual International Cryptology Conference CRYPTO ’96 - Santa Barbara, California
Duration: 1996 Aug 121996 Aug 18

Publication series

Name
Volume1109
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference16th Annual International Cryptology Conference CRYPTO ’96
Period1996/08/121996/08/18

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Free keywords

  • exponential sums
  • Universal hash functions
  • authentication codes
  • Galois rings

Fingerprint

Dive into the research topics of 'Universal hash functions from exponential sums over finite fields and Galois rings'. Together they form a unique fingerprint.

Cite this