메뉴 건너뛰기




Volumn 2, Issue 1, 1990, Pages 23-49

The combinatorics of authentication and secrecy codes

Author keywords

Authentication code; Combinatorial design; Secrecy code

Indexed keywords

CODES, SYMBOLIC--ENCODING; DATA PROCESSING--SECURITY OF DATA; INFORMATION THEORY; MATHEMATICAL TECHNIQUES--COMBINATORIAL MATHEMATICS; PROBABILITY;

EID: 0025212061     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/BF02252868     Document Type: Article
Times cited : (109)

References (29)
  • 9
    • 84934266139 scopus 로고    scopus 로고
    • E. S. Kramer, D. L. Kreher, R. Rees, and D. R. Stinson, On perpendicular arrays with t ≥ 3, Ars Combin., to appear.
  • 11
    • 84934266142 scopus 로고    scopus 로고
    • J. L. Massey, Cryptography—a selective survey, in Digital Communications, 1986, pp. 3–21.
  • 15
    • 84934266141 scopus 로고    scopus 로고
    • P. Schobi, Perfect authentication systems for data sources with arbitrary statistics, presented at Eurocrypt '86.
  • 18
    • 84934266137 scopus 로고    scopus 로고
    • G. J. Simmons, Verification of treaty compliance—revisited, in Proc. IEEE 1983 Symposium on Security and Privacy, Oakland, 1984, pp. 61–66.
  • 26
    • 0024144985 scopus 로고
    • A construction for authentication/secrecy codes from certain combinatorial designs
    • (1988) J. Cryptology , vol.1 , pp. 119-127
    • Stinson, D.R.1
  • 27
    • 84934266136 scopus 로고    scopus 로고
    • D. R. Stinson and L. Teirlinck, A construction for authentication/secrecy codes from 3-homogeneous permutation groups, European J. Combin., to appear.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.