This result resolves one of the main questions left open by the work of Dodis and Spencer [DS02] who considered this problem for one-time message authentication of one-bit messages.
Category / Keywords: foundations / message authentication codes; weak keys; entropy; hash functions Original Publication (with minor differences): 2015 IEEE Information Theory Workshop Date: received 9 Apr 2015, last revised 7 Aug 2015 Contact author: alexgolovnev at gmail com Available format(s): PDF | BibTeX Citation Version: 20150807:124705 (All versions of this report) Short URL: ia.cr/2015/324 Discussion forum: Show discussion | Start new discussion