-
1
-
-
0028406840
-
Estimate of the maximal number of messages for a given probability of succesful deception
-
L. Bassalygo and M. Burnashev, "Estimate of the maximal number of messages for a given probability of succesful deception," Probl. Inform. Transm.. vol. 30, no. 2, pp. 42-48, 1994.
-
(1994)
Probl. Inform. Transm..
, vol.30
, Issue.2
, pp. 42-48
-
-
Bassalygo, L.1
Burnashev, M.2
-
2
-
-
0000057495
-
Universal hashing and geometric codes
-
J. Birbrauer, "Universal hashing and geometric codes," Des., Codes, and Crypt., vol. 11, pp. 207-221, 1997.
-
(1997)
Des., Codes, and Crypt.
, vol.11
, pp. 207-221
-
-
Birbrauer, J.1
-
3
-
-
84878363139
-
On the relation between A-codes and codes correcting independent errors
-
Lecture Notes in Computer Science, vol. 765 (Lofthus, Norway, 1993), T. Helleseth, Ed. New York: Springer
-
T. Johansson, G. Kabatianskii, and B. Smeets, "On the relation between A-codes and codes correcting independent errors," in Advances in Cryptology, Proc. Eurocrypt '93 (Lecture Notes in Computer Science, vol. 765) (Lofthus, Norway, 1993), T. Helleseth, Ed. New York: Springer, 1994, pp. 1-11.
-
(1994)
Advances in Cryptology, Proc. Eurocrypt '93
, pp. 1-11
-
-
Johansson, T.1
Kabatianskii, G.2
Smeets, B.3
-
4
-
-
0030106709
-
On the cardinality of systematic authentication codes via error correcting codes
-
Mar.
-
G. Kabatianskii, B. Smeets, and T. Johansson, "On the cardinality of systematic authentication codes via error correcting codes," IEEE Trans. Inform. Theory, vol. 42, pp. 566-578, Mar. 1996.
-
(1996)
IEEE Trans. Inform. Theory
, vol.42
, pp. 566-578
-
-
Kabatianskii, G.1
Smeets, B.2
Johansson, T.3
-
5
-
-
0016038540
-
Codes which detect deception
-
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, "Codes which detect deception," Bell Syst. Tech. J., vol. 53, no. 3, pp. 405-424, 1974.
-
(1974)
Bell Syst. Tech. J.
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.N.1
MacWilliams, F.J.2
Sloane, N.J.A.3
-
6
-
-
0347909351
-
Contemporary cryptology, an introduction
-
G. J. Simmons, Ed. New York: IEEE Press
-
J. L. Massey, "Contemporary cryptology, an introduction," in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, Ed. New York: IEEE Press, 1991, pp. 3-39.
-
(1991)
Contemporary Cryptology, the Science of Information Integrity
, pp. 3-39
-
-
Massey, J.L.1
-
7
-
-
0011365344
-
A game theory model of digital message authentication
-
G. J. Simmons, "A game theory model of digital message authentication," Congr. Numer., vol. 34, pp. 413-424, 1992.
-
(1992)
Congr. Numer.
, vol.34
, pp. 413-424
-
-
Simmons, G.J.1
-
8
-
-
0003038453
-
A survey of information authentication
-
G. J. Simmons, Ed. New York: IEEE Press
-
_, "A survey of information authentication," in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, Ed. New York: IEEE Press, 1991.
-
(1991)
Contemporary Cryptology, The Science of Information Integrity
-
-
-
9
-
-
0344818561
-
Universal hashing and authentication codes
-
Santa Barbara, CA
-
D. R. Stinson, "Universal hashing and authentication codes," in Proc. Crypto '91 (Santa Barbara, CA, 1991), pp. 74-85.
-
(1991)
Proc. Crypto '91
, pp. 74-85
-
-
Stinson, D.R.1
-
11
-
-
0006732406
-
Two remarks on the spectra of algebraic geometry codes
-
Luminy, France, 1993, M. Perret, R. Pellikaan, and S. G. Vlǎdut, Eds. Berlin, NY: W. de Gruyter
-
S. G. Vlǎdut, "Two remarks on the spectra of algebraic geometry codes," in Arithmetic, Geometry and Coding Theory 4 (Luminy, France, 1993), M. Perret, R. Pellikaan, and S. G. Vlǎdut, Eds. Berlin, NY: W. de Gruyter, 1996, pp. 253-262.
-
(1996)
Arithmetic, Geometry and Coding Theory 4
, pp. 253-262
-
-
Vlǎdut, S.G.1
-
12
-
-
0023241277
-
An exhaustion bound for algebraic-geometric modular codes
-
S. G. Vlǎdut, "An exhaustion bound for algebraic-geometric modular codes," Probl. Inform. Transm., vol. 23, pp. 22-34, 1987.
-
(1987)
Probl. Inform. Transm.
, vol.23
, pp. 22-34
-
-
Vlǎdut, S.G.1
|