메뉴 건너뛰기




Volumn 2, Issue 3, 1990, Pages 131-143

Information-theoretic bounds for authentication schemes

Author keywords

Authentication schemes; Incidence structures

Indexed keywords

CODES, SYMBOLIC--ENCODING; INFORMATION THEORY; PROBABILITY;

EID: 0025594980     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/BF00190800     Document Type: Article
Times cited : (32)

References (10)
  • 1
    • 0023364917 scopus 로고
    • Comments on Massey's concepts of perfect secrecy and perfect authenticity
    • (1987) Alta Frequenza , vol.56 , Issue.4 , pp. 227-228
    • Castagnoli, G.1
  • 2
    • 84934255489 scopus 로고    scopus 로고
    • M. De Soete, Some constructions for authentication—secrecy codes, Advances in Cryptology—Proceedings of Eurocrypt 88, Lecture Notes in Computer Science, Vol. 330, Springer-Verlag, Berlin, 1988, pp. 57–75.
  • 3
    • 84934255493 scopus 로고    scopus 로고
    • M. De Soete, K. Vedder, and M. Walker, Authentication schemes (to appear in the Proceedings of Eurocrypt 89).
  • 7
    • 84934255494 scopus 로고    scopus 로고
    • P. Schobi, Perfect authentication systems for data sources with arbitrary statistics (Preprint).
  • 8
    • 84934255491 scopus 로고    scopus 로고
    • G. J. Simmons, Authentication theory/coding theory, Advances in Cryptology—Proceedings of Crypto 84, Lecture Notes in Computer Science, Vol. 196, Springer-Verlag, Berlin, 1985, pp. 411–431


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.