B.Schneier,Applied Cryptography,New Yor,.[J].John Wiley Sons Inc.1994,Chapter1. [2]G.J.Simmous:-[2]J.L.Carter,M.N.Wegman.Universal classes of hash functions,Journal of Computer and System Science,1979,18(2),143-154.[3]J.Bierbrauer,T.Johansson,G.Kabatianskii,et.al.On families of hash funcations via geometric eodes and concatenation,Crypto93(KBCS 773),Berlin,Springer-Verlag,1994,331-342.[4]T.Helleseth,T.Johansson,Universal hash functions from exponential sums over finite fields and Galds rings,Proc.of Crypto96 Berlin,Springer-Verlag,1996,34-41.[5]D.R.Stinson,Combinatorial characterization of authentication codes,Designs.Codes and Cayp-tography,1992,2(2):175-187.[6]D.R.Stinson,Combinatorial techniques for universal hashing.Journal of Computer and System Science,1994,48(3),337-346.[7]T.W.Hungerford.Algebra.New York,Springer-Verlag,Inc,1974,Chapter 1.
|