-
1
-
-
0016038540
-
Codes which detect deception
-
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, “Codes which detect deception,” Bell Syst. Tech. J., vol. 53, pp. 405-424, 1974.
-
(1974)
Bell Syst. Tech. J.
, vol.53
, pp. 405-424
-
-
Gilbert, E.N.1
MacWilliams, F.J.2
Sloane, N.J.A.3
-
2
-
-
84983269168
-
Authentication theory/coding theory
-
G. J. Simmons, “Authentication theory/coding theory,” in Advances in Cryptology, Proc. CRYPTO 84, G. R. Blakley and D. Chaum, Eds., Lecture Notes in Computer Science, Vol. 196. New York: Springer, 1985, pp. 411-431.
-
(1985)
Advances in Cryptology
, vol.196
, pp. 411-431
-
-
Simmons, G.J.1
-
3
-
-
0347909351
-
Contemporary cryptology, an introduction
-
J. L. Massey, “Contemporary cryptology, an introduction,” in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, Ed. New York: IEEE Press, 1991, pp. 3-39.
-
(1991)
Contemporary Cryptology
, pp. 3-39
-
-
Massey, J.L.1
-
4
-
-
0025157340
-
A Cartesian product construction for unconditionally secure authentication codes that permit arbitration
-
G. J. Simmons, “A Cartesian product construction for unconditionally secure authentication codes that permit arbitration,” J. Cryptology, vol. 2, no. 2, pp. 77-104, 1990.
-
(1990)
J. Cryptology
, vol.2
, Issue.2
, pp. 77-104
-
-
Simmons, G.J.1
-
5
-
-
84920719029
-
Message authentication with arbitration of transmitter/receiver disputes
-
April
-
—, “Message authentication with arbitration of transmitter/receiver disputes,” in Proc. Eurocrypt '87, Amsterdam, The Netherlands, April 13-15, 1987, D. Chaum and W. L. Price, Eds. Berlin: Springer-Verlag, 1988, pp. 151-165.
-
(1988)
Proc. Eurocrypt '87
, pp. 151-165
-
-
-
7
-
-
85017093546
-
Authentication codes with multiple arbiters
-
May
-
E. F. Brickell and D. R. Stinson, “Authentication codes with multiple arbiters,” in Proc. Eurocrypt '88, Davos, Switzerland, May 25-27, 1988, C. G. Gunter, Ed. Berlin: Springer-Verlag, 1988, pp. 51-55.
-
(1988)
Proc. Eurocrypt '88
, pp. 51-55
-
-
Brickell, E.F.1
Stinson, D.R.2
-
8
-
-
0347188260
-
Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attack
-
Y. Desmedt and M. Yung, “Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attack,” in Proc. Crypto '90. Berlin: Springer-Verlag, pp. 177-188.
-
Proc. Crypto '90. Berlin: Springer-Verlag
, pp. 177-188
-
-
Desmedt, Y.1
Yung, M.2
-
9
-
-
0026191173
-
Strengthening Simmons' bound on Impersonation
-
July
-
R. Johannesson and A. Sgarro, “Strengthening Simmons' bound on Impersonation,” in IEEE Trans. Inform. Theory, vol. 37, pp. 1182-1185, July 1991.
-
(1991)
IEEE Trans. Inform. Theory
, vol.37
, pp. 1182-1185
-
-
Johannesson, R.1
Sgarro, A.2
-
11
-
-
84946245411
-
Bounds on the probability of deception in multiple authentication
-
B. Smeets, “Bounds on the probability of deception in multiple authentication,” IEEE Trans. Inform. Theory, see this issue.
-
IEEE Trans. Inform. Theory
-
-
Smeets, B.1
-
13
-
-
84878363139
-
On the relation between A -codes and codes correcting independent errors
-
T. Johansson, G. Kabatianskii, and B. Smeets, “On the relation between A -codes and codes correcting independent errors,” in Proc. Eurocrypt '93, Berlin: Springer-Verlag, 1994, pp. 1-11.
-
(1994)
Proc. Eurocrypt '93
, pp. 1-11
-
-
Johansson, T.1
Kabatianskii, G.2
Smeets, B.3
|