Results 1 to 10 of about 945,337 (242)
QKD parameter estimation by two-universal hashing [PDF]
This paper proposes and proves security of a QKD protocol which uses two-universal hashing instead of random sampling to estimate the number of bit flip and phase flip errors.
Dimiter Ostrev
doaj +6 more sources
The computational complexity of universal hashing [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yishay Mansour +2 more
semanticscholar +3 more sources
Regular and almost universal hashing: an efficient implementation [PDF]
Random hashing can provide guarantees regarding the performance of data structures such as hash tables---even in an adversarial setting. Many existing families of hash functions are universal: given two data objects, the probability that they have the ...
Ignatchenko, Sergey +2 more
core +6 more sources
Universal Hashing and Multiple Authentication [PDF]
In this paper, we study unconditionally secure codes that provide authentication without secrecy. Our point of view is the universal hashing approach pioneered by Wegman and Carter in 1981. We first compare several recent universal-hashing based constructions for authentication codes.
Mustafa Atıcı, D. R. Stinson
semanticscholar +3 more sources
Universal Hashing for Information-Theoretic Security [PDF]
Corrected an error in the proof of Lemma ...
Himanshu Tyagi, Alexander Vardy
semanticscholar +6 more sources
Universal hash functions from quantum procedures
Modern quantum technologies are NISQ (Noisy Intermediate-Scale Quantum) devices, which are used to create insufficiently accurate quantum computers with low computing power.
F.M. Ablayev, M.T. Ziatdinov
doaj +3 more sources
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
In this paper we introduce a new keyed hash function based on 32-bit integer multiplication that we call Multimixer-128. In our approach, we follow the key-then-hash parallel paradigm. So, we first add a variable length input message to a secret key and
Koustabh Ghosh +2 more
doaj +2 more sources
One-Time Universal Hashing Quantum Digital Signatures without Perfect Keys [PDF]
Quantum digital signatures (QDS), generating correlated bit strings among three remote parties for signatures through quantum law, can guarantee non-repudiation, authenticity, and integrity of messages. Recently, one-time universal hashing QDS framework,
Bing-Hong Li +6 more
openalex +3 more sources
Strongly universal string hashing is fast [PDF]
We present fast strongly universal string hashing families: they can process data at a rate of 0.2 CPU cycle per byte. Maybe surprisingly, we find that these families---though they require a large buffer of random numbers---are often faster than popular ...
Kaser, Owen, Lemire, Daniel
core +5 more sources
A Fast Single-Key Two-Level Universal Hash Function
Universal hash functions based on univariate polynomials are well known, e.g. Poly1305 and GHASH. Using Horner’s rule to evaluate such hash functionsrequire l − 1 field multiplications for hashing a message consisting of l blocks where each block is one ...
Debrup Chakraborty +2 more
doaj +2 more sources

