-
1
-
-
0011365344
-
"A game theory model of digital message authentication
-
vol. 34, pp. 413-424, 1992.
-
G. J. Simmons, "A game theory model of digital message authentication," Congr. Numer., vol. 34, pp. 413-424, 1992.
-
" Congr. Numer.
-
-
Simmons, G.J.1
-
2
-
-
0347909351
-
"Contemporary cryptology, an introduction
-
1991, pp. 3-39.
-
J. L. Massey, "Contemporary cryptology, an introduction," in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, Ed. New York: IEEE Press, 1991, pp. 3-39.
-
" in Contemporary Cryptology, the Science of Information Integrity, G. J. Simmons, Ed. New York: IEEE Press
-
-
Massey, J.L.1
-
4
-
-
0019572642
-
"New hash functions and their use in authentication and set equality
-
vol. 22, pp. 265-279, 1981.
-
M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Syst. Sci., vol. 22, pp. 265-279, 1981.
-
" J. Comput. Syst. Sci.
-
-
Wegman, M.N.1
Carter, J.L.2
-
5
-
-
0344818561
-
"Universal hashing and authentication codes
-
91 (Santa Barbara, CA, 1991), pp. 74-85.
-
D. R. Stinson, "Universal hashing and authentication codes," in Proc. Crypta 91 (Santa Barbara, CA, 1991), pp. 74-85.
-
" in Proc. Crypta
-
-
Stinson, D.R.1
-
6
-
-
0000410707
-
"
-
vol. 4, no. 4, pp 369-380. This is a final version of [5].
-
"Universal hashing and authentication codes," Des., Codes, Cryplogr., vol. 4, no. 4, pp 369-380. This is a final version of [5].
-
" Des., Codes, Cryplogr.
-
-
Hashing, U.1
Codes, A.2
-
7
-
-
0016038540
-
"Codes which detect deception
-
vol. 53, no. 3, pp. 405-424, 1974.
-
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, "Codes which detect deception," Bell Syst. Tech. J., vol. 53, no. 3, pp. 405-424, 1974.
-
" Bell Syst. Tech. J.
-
-
Gilbert, E.N.1
MacWilliams, F.J.2
Sloane, N.J.A.3
-
8
-
-
84983269168
-
"Authentication theory/coding theory
-
84 (Lecture Notes in Computer Science, no. 196), G.R. Blakley and D. Chaum, Eds. New York, NY: SpringerVerrlag, 1985, pp. 411-431.
-
G. J. Simmons, "Authentication theory/coding theory," in Advances in Cryplology, Proc. CRYPTO 84 (Lecture Notes in Computer Science, no. 196), G.R. Blakley and D. Chaum, Eds. New York, NY: SpringerVerrlag, 1985, pp. 411-431.
-
" in Advances in Cryplology, Proc. CRYPTO
-
-
Simmons, G.J.1
-
10
-
-
0346810208
-
"On the relation between A-codes and codes correcting independent errors
-
93 Lecture Notes in Computer Science, no.
-
T. lohansson, G. Kabatianskii, and B. Smeels, "On the relation between A-codes and codes correcting independent errors," in Advances in Cryptology, Proc. Eurocrypt'93 (Lecture Notes in Computer Science, no.
-
" in Advances in Cryptology, Proc. Eurocrypt'
-
-
Lohansson, T.1
Kabatianskii, G.2
Smeels, B.3
-
11
-
-
33747268393
-
-
1993. New York: SpringerVerlag, 1994, pp. 1 -11.
-
765), T. HeUeseth, Ed. (Lotthus, Norway, 1993). New York: SpringerVerlag, 1994, pp. 1 -11.
-
-
-
Heueseth, T.1
Lotthus, E.2
Norway3
-
12
-
-
0027585291
-
'Lower bounds on the probability of successful deception.of a message
-
vol. 29, no. 2, pp. 104-108, 1993 (ill Russian).
-
L. A. Bassalygo, 'Lower bounds on the probability of successful deception.of a message," Probt. Inform. Transm., vol. 29, no. 2, pp. 104-108, 1993 (ill Russian).
-
" Probt. Inform. Transm.
-
-
Bassalygo, L.A.1
-
13
-
-
0025212061
-
"The combinatorics of authentication and secrecy codes
-
vol. 2, no 1, pp. 23-49, 1990.
-
D. R. Slinson, "The combinatorics of authentication and secrecy codes," / CryptoL, vol. 2, no 1, pp. 23-49, 1990.
-
" / CryptoL
-
-
Slinson, D.R.1
-
14
-
-
0038452683
-
"Combinatorial characterizations of authentication codes
-
vol. 2, pp, 175-187, 1992.
-
"Combinatorial characterizations of authentication codes," Des., Codes, Cryptogr., vol. 2, pp, 175-187, 1992.
-
" Des., Codes, Cryptogr.
-
-
-
18
-
-
33747294222
-
"Essentially C-fold secure authentication systems
-
1990 (Aarhus, Denmark, 1990), pp. 294-305.
-
A. Beutelspacher and U. Rosenbaum, "Essentially C-fold secure authentication systems," in Advances in Cryptology, Proc. Eurocrypt 1990 (Aarhus, Denmark, 1990), pp. 294-305.
-
" in Advances in Cryptology, Proc. Eurocrypt
-
-
Beutelspacher, A.1
Rosenbaum, U.2
-
19
-
-
0017468074
-
"New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities
-
23, pp. 157-166. 1977.
-
R. 1. McEliece, E. R. Rodemich, H. Rumsey Jr., and L. R. Welch. "New upper bounds on the rate of a code via the Delsarte-MacWilliams inequalities," IEEE Trans. Inform. Theory, vol. IT23, pp. 157-166. 1977.
-
" IEEE Trans. Inform. Theory, Vol. IT
-
-
McEliece, R.1
Rodemich, E.R.2
Rumsey Jr., H.3
Welch, L.R.4
-
20
-
-
0028406840
-
"Estimate of the maximal number of messages for a given probability of successful deception
-
vol. 30, no. 2, pp. 42-48, 1994 (in Russian).
-
L. A. Bassalygo and M.V. Burnashev, "Estimate of the maximal number of messages for a given probability of successful deception," ProbL Inform. Transm., vol. 30, no. 2, pp. 42-48, 1994 (in Russian).
-
" ProbL Inform. Transm.
-
-
Bassalygo, L.A.1
Burnashev, M.V.2
-
21
-
-
0013259203
-
"A simple and key-economical unconditionally authentication scheme
-
vol. 2, pp. 65-71, 1993.
-
B. den Boer, "A simple and key-economical unconditionally authentication scheme," J. Comput. Security, vol. 2, pp. 65-71, 1993.
-
" J. Comput. Security
-
-
Den Boer, B.1
-
22
-
-
0021522108
-
-
vol. 21, pp. 339-374, 1984.
-
K. Mehlhom and U. Vishkin, "Randomized and deterministic simulations of PRAM's by parallel machines with restricted granularity of parallel memories, Acta Inform., vol. 21, pp. 339-374, 1984.
-
"Randomized and deterministic simulations of PRAM's by parallel machines with restricted granularity of parallel memories, Acta Inform
-
-
Mehlhom, K.1
Vishkin, U.2
-
23
-
-
84974696785
-
-
93 (Lecture Notes in Computer Science, no. 773), Ü. R. Stinson, Ed (Santa Barbara, CA, Aug. 1993). New York: Springer-Verlag, 1994, pp. 331-342.
-
J. Bierbrauer, T. Johansson, G. Kabatianskii, and B. Smeets, "On families of hash functions via geometric codes and concatenation;" in Advances in Cryptology, Proc. CRYPTO 93 (Lecture Notes in Computer Science, no. 773), Ü. R. Stinson, Ed (Santa Barbara, CA, Aug. 1993). New York: Springer-Verlag, 1994, pp. 331-342.
-
"On families of hash functions via geometric codes and concatenation;" in Advances in Cryptology, Proc. CRYPTO
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
25
-
-
84991939136
-
"LFSR-based hashing and authentication
-
94 (Lecture Notes in Computer Science, no. 839), Y. Desmedt, Ed. (Santa Barbara, CA, Aug. 1994). New York: Springer-Verlag, 1994, pp. 129-139.
-
H. Krawczyk, "LFSR-based hashing and authentication," in Advances in Cryptology, Proc. CRYPTO 94 (Lecture Notes in Computer Science, no. 839), Y. Desmedt, Ed. (Santa Barbara, CA, Aug. 1994). New York: Springer-Verlag, 1994, pp. 129-139.
-
" in Advances in Cryptology, Proc. CRYPTO
-
-
Krawczyk, H.1
|