Maximizing the hash function of authentication codes | IEEE Journals & Magazine | IEEE Xplore