Bucket hashing and its application to fast message authentication

We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x , cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of...

Full description

Saved in:
Bibliographic Details
Published in:Journal of cryptology Vol. 12; no. 2; pp. 91 - 115
Main Author: ROGAWAY, P
Format: Journal Article
Language:English
Published: New York, NY Springer 01-03-1999
Springer Nature B.V
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x , cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman—Carter authentication, this style of hash function provides a fast approach for software message authentication.
ISSN:0933-2790
1432-1378
DOI:10.1007/PL00003822