Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

MMH-Badger MAC

Known as: MMH 
Badger is a Message Authentication Code (MAC) based on the idea of universal hashing and was developed by Boesgaard, Christensen, and Zenner. It is… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family… Expand
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In this paper we show how animal personality could explain some of the large inter-individual variation in resting metabolic rate… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Montgomery Prime Hashing (MPH) is a scheme for message authentication based on universal hashing.I n MPH, roughly speaking, the… Expand
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2000
2000
We present the leading order unpolarized and polarized cross sections in electroweak semi-inclusive deep inelastic… Expand
  • figure 1
Is this relevant?
2000
2000
Abstract : Propellant toxicity is a major concern in storing, maintaining, and transporting strategic missiles. Many low toxicity… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We describe a message authentication algorithm, UMAC, which can authenticate messages (in software, on contemporary machines… Expand
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
1998
Highly Cited
1998
2O), carbon dioxide (CO2), and sulfur dioxide (SO2). Real-time detection of CO, N2O, and CO2 was performed in open air over a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We describe a construction of almost universal hash functions suitable for very fast software implementation and applicable to… Expand
Is this relevant?