Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
B. den Boer, “A simple and key-economical unconditional authentication scheme,” Journal of Computer Security, Vol. 2, No. 1, 1993, pp. 65–71.
D. Chaum, M. van der Ham and B. den Boer, “A provably secure and efficient message authentication scheme,” available from the authors, April 1992.
T. Johansson, G. Kabatianskii, and B. Smeets, “On the relation between A-codes and codes correcting independent errors,” Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 1–11.
D.E. Knuth, The Art of Computer Programming, Vol. 2, Seminumerical Algorithms, 2nd Edition, Addison-Wesley, Reading, Mass., 1981.
K. Mehlhorn and U. Vishkin, “Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories,” Acta Informatica, Vol. 21, 1984, pp. 339–374.
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Bosselaers, A., Preneel, B. (1995). IBC-hash. In: Bosselaers, A., Preneel, B. (eds) Integrity Primitives for Secure Information Systems. Lecture Notes in Computer Science, vol 1007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60640-8_7
Download citation
DOI: https://doi.org/10.1007/3-540-60640-8_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60640-6
Online ISBN: 978-3-540-48517-9
eBook Packages: Springer Book Archive