On Hardware-Oriented Message Authentication
(2012) In IET Information Security 6(4). p.329-336- Abstract
- We consider hardware-oriented message authentication, more specifically universal hash functions. We propose a new type of constructions that appear promising. These constructions are based on the framework of universal hash functions, Toeplitz matrices and epsilon-biased sample spaces. Some new theoretical results in this area are derived. The new constructions come at the price of not being able to prove the exact substitution probability. The expected probability is examined both through theoretical methods as well as
through simulation.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/2629326
- author
- Ågren, Martin LU ; Hell, Martin LU and Johansson, Thomas LU
- organization
- publishing date
- 2012
- type
- Contribution to journal
- publication status
- published
- subject
- keywords
- Message Authentication Codes, Universal Hash Functions
- in
- IET Information Security
- volume
- 6
- issue
- 4
- pages
- 329 - 336
- publisher
- Institution of Engineering and Technology
- external identifiers
-
- wos:000312962100012
- scopus:84878355688
- ISSN
- 1751-8717
- project
- EIT_HSWC:Coding Coding, modulation, security and their implementation
- language
- English
- LU publication?
- yes
- id
- 5e2ff22f-2f7f-4956-a9d4-fed6e224f47c (old id 2629326)
- date added to LUP
- 2016-04-04 08:56:51
- date last changed
- 2023-09-19 18:47:08
@article{5e2ff22f-2f7f-4956-a9d4-fed6e224f47c, abstract = {{We consider hardware-oriented message authentication, more specifically universal hash functions. We propose a new type of constructions that appear promising. These constructions are based on the framework of universal hash functions, Toeplitz matrices and epsilon-biased sample spaces. Some new theoretical results in this area are derived. The new constructions come at the price of not being able to prove the exact substitution probability. The expected probability is examined both through theoretical methods as well as<br/><br> through simulation.}}, author = {{Ågren, Martin and Hell, Martin and Johansson, Thomas}}, issn = {{1751-8717}}, keywords = {{Message Authentication Codes; Universal Hash Functions}}, language = {{eng}}, number = {{4}}, pages = {{329--336}}, publisher = {{Institution of Engineering and Technology}}, series = {{IET Information Security}}, title = {{On Hardware-Oriented Message Authentication}}, volume = {{6}}, year = {{2012}}, }