Constructions of Hash Functions and Message Authentication Codes

  • Thursday, April 23, 2015 | 9:10 AM – 10:00 AM | West | Room: 2000

View all Sessions

In this session, constructions of hash functions and message authentication codes from ciphers or random permutations are presented.
Topic 1: Hash Functions from Defective Ideal Ciphers
Authors: Jonathan Katz, Stefan Lucks, Aishwarya Thiruvengadam 
Topic 2: Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication
Author: Yusi Zhang


This document was retrieved from on Tue, 19 Feb 2019 16:28:39 -0500.