Bucket hashing and its application to fast message authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x , cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of...
Saved in:
Published in: | Journal of cryptology Vol. 12; no. 2; pp. 91 - 115 |
---|---|
Main Author: | |
Format: | Journal Article |
Language: | English |
Published: |
New York, NY
Springer
01-03-1999
Springer Nature B.V |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x , cast each of its words into a small number of buckets; xor the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman—Carter authentication, this style of hash function provides a fast approach for software message authentication. |
---|---|
ISSN: | 0933-2790 1432-1378 |
DOI: | 10.1007/PL00003822 |