Constructions of Hash Functions and Message Authentication Codes
In this session, constructions of hash functions and message authentication codes from ciphers or random permutations are presented.
Topic 1: Hash Functions from Defective Ideal Ciphers
Authors: Jonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam
Topic 2: Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication
Author: Yusi Zhang