메뉴 건너뛰기




Volumn 42, Issue 2, 1996, Pages 566-578

On the cardinality of systematic authentication codes via error-correcting codes

Author keywords

[No Author keywords available]

Indexed keywords

CODE CONVERTERS; COMMUNICATION CHANNELS (INFORMATION THEORY); DATA COMMUNICATION SYSTEMS; ERROR CORRECTION; PROBABILITY; SECURITY OF DATA; STATE SPACE METHODS;

EID: 0030106709     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/18.485725     Document Type: Article
Times cited : (36)

References (25)
  • 1
    • 0011365344 scopus 로고    scopus 로고
    • "A game theory model of digital message authentication
    • vol. 34, pp. 413-424, 1992.
    • G. J. Simmons, "A game theory model of digital message authentication," Congr. Numer., vol. 34, pp. 413-424, 1992.
    • " Congr. Numer.
    • Simmons, G.J.1
  • 4
    • 0019572642 scopus 로고    scopus 로고
    • "New hash functions and their use in authentication and set equality
    • vol. 22, pp. 265-279, 1981.
    • M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Syst. Sci., vol. 22, pp. 265-279, 1981.
    • " J. Comput. Syst. Sci.
    • Wegman, M.N.1    Carter, J.L.2
  • 5
    • 0344818561 scopus 로고    scopus 로고
    • "Universal hashing and authentication codes
    • 91 (Santa Barbara, CA, 1991), pp. 74-85.
    • D. R. Stinson, "Universal hashing and authentication codes," in Proc. Crypta 91 (Santa Barbara, CA, 1991), pp. 74-85.
    • " in Proc. Crypta
    • Stinson, D.R.1
  • 6
    • 0000410707 scopus 로고    scopus 로고
    • "
    • vol. 4, no. 4, pp 369-380. This is a final version of [5].
    • "Universal hashing and authentication codes," Des., Codes, Cryplogr., vol. 4, no. 4, pp 369-380. This is a final version of [5].
    • " Des., Codes, Cryplogr.
    • Hashing, U.1    Codes, A.2
  • 8
    • 84983269168 scopus 로고    scopus 로고
    • "Authentication theory/coding theory
    • 84 (Lecture Notes in Computer Science, no. 196), G.R. Blakley and D. Chaum, Eds. New York, NY: SpringerVerrlag, 1985, pp. 411-431.
    • G. J. Simmons, "Authentication theory/coding theory," in Advances in Cryplology, Proc. CRYPTO 84 (Lecture Notes in Computer Science, no. 196), G.R. Blakley and D. Chaum, Eds. New York, NY: SpringerVerrlag, 1985, pp. 411-431.
    • " in Advances in Cryplology, Proc. CRYPTO
    • Simmons, G.J.1
  • 11
    • 33747268393 scopus 로고    scopus 로고
    • 1993. New York: SpringerVerlag, 1994, pp. 1 -11.
    • 765), T. HeUeseth, Ed. (Lotthus, Norway, 1993). New York: SpringerVerlag, 1994, pp. 1 -11.
    • Heueseth, T.1    Lotthus, E.2    Norway3
  • 12
    • 0027585291 scopus 로고    scopus 로고
    • 'Lower bounds on the probability of successful deception.of a message
    • vol. 29, no. 2, pp. 104-108, 1993 (ill Russian).
    • L. A. Bassalygo, 'Lower bounds on the probability of successful deception.of a message," Probt. Inform. Transm., vol. 29, no. 2, pp. 104-108, 1993 (ill Russian).
    • " Probt. Inform. Transm.
    • Bassalygo, L.A.1
  • 13
    • 0025212061 scopus 로고    scopus 로고
    • "The combinatorics of authentication and secrecy codes
    • vol. 2, no 1, pp. 23-49, 1990.
    • D. R. Slinson, "The combinatorics of authentication and secrecy codes," / CryptoL, vol. 2, no 1, pp. 23-49, 1990.
    • " / CryptoL
    • Slinson, D.R.1
  • 14
    • 0038452683 scopus 로고    scopus 로고
    • "Combinatorial characterizations of authentication codes
    • vol. 2, pp, 175-187, 1992.
    • "Combinatorial characterizations of authentication codes," Des., Codes, Cryptogr., vol. 2, pp, 175-187, 1992.
    • " Des., Codes, Cryptogr.
  • 20
    • 0028406840 scopus 로고    scopus 로고
    • "Estimate of the maximal number of messages for a given probability of successful deception
    • vol. 30, no. 2, pp. 42-48, 1994 (in Russian).
    • L. A. Bassalygo and M.V. Burnashev, "Estimate of the maximal number of messages for a given probability of successful deception," ProbL Inform. Transm., vol. 30, no. 2, pp. 42-48, 1994 (in Russian).
    • " ProbL Inform. Transm.
    • Bassalygo, L.A.1    Burnashev, M.V.2
  • 21
    • 0013259203 scopus 로고    scopus 로고
    • "A simple and key-economical unconditionally authentication scheme
    • vol. 2, pp. 65-71, 1993.
    • B. den Boer, "A simple and key-economical unconditionally authentication scheme," J. Comput. Security, vol. 2, pp. 65-71, 1993.
    • " J. Comput. Security
    • Den Boer, B.1
  • 25
    • 84991939136 scopus 로고    scopus 로고
    • "LFSR-based hashing and authentication
    • 94 (Lecture Notes in Computer Science, no. 839), Y. Desmedt, Ed. (Santa Barbara, CA, Aug. 1994). New York: Springer-Verlag, 1994, pp. 129-139.
    • H. Krawczyk, "LFSR-based hashing and authentication," in Advances in Cryptology, Proc. CRYPTO 94 (Lecture Notes in Computer Science, no. 839), Y. Desmedt, Ed. (Santa Barbara, CA, Aug. 1994). New York: Springer-Verlag, 1994, pp. 129-139.
    • " in Advances in Cryptology, Proc. CRYPTO
    • Krawczyk, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.