-
4
-
-
0016038540
-
-
Bell Syst. Tech. J., vol. 53, no. 3, pp. 405-424, 1974.
-
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception, Bell Syst. Tech. J., vol. 53, no. 3, pp. 405-424, 1974.
-
Codes Which Detect Deception
-
-
Gilbert, E.N.1
MacWilliams, F.J.2
Sloane, N.J.A.3
-
5
-
-
0026191173
-
-
IEEE Trans. Inform. Theory, vol. 37, pp. 1182-1185, July 1991.
-
R. Johannesson and A. Sgarro, Strengthening Simmons' bound on impersonation, IEEE Trans. Inform. Theory, vol. 37, pp. 1182-1185, July 1991.
-
Strengthening Simmons' Bound on Impersonation
-
-
Johannesson, R.1
Sgarro, A.2
-
7
-
-
0347909351
-
-
in Contemporary Cryptology - The Science of Information Integrity, G. J. Simmons, Ed. Piscataway, NJ: IEEE Press, 1992.
-
J. E. Massey, Contemporary cryptology - An introduction, in Contemporary Cryptology - The Science of Information Integrity, G. J. Simmons, Ed. Piscataway, NJ: IEEE Press, 1992.
-
Contemporary Cryptology - An Introduction
-
-
Massey, J.E.1
-
9
-
-
0017930809
-
-
Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
R. E. Rivest, A. Shamir, and E. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
A Method for Obtaining Digital Signatures and Public-key Cryptosystems
-
-
Rivest, R.E.1
Shamir, A.2
Adleman, E.3
-
10
-
-
0027607095
-
-
J. Cryptol., vol. 6, no. 3, pp. 135-156, 1993.
-
U. Rosenbaum, A lower bound on authentication after having observed a sequence of messages, J. Cryptol., vol. 6, no. 3, pp. 135-156, 1993.
-
A Lower Bound on Authentication after Having Observed A Sequence of Messages
-
-
Rosenbaum, U.1
-
11
-
-
85032873137
-
-
in Advances in Cryptology - Eurocrypt '89 (Lecture Notes in Computer Science), J.-J. Quisquater and J. Vandewalle, Eds. Berlin, Germany: Springer-Verlag, 1985, pp. 93-101.
-
A. Sgarro, Information divergence bounds for authentication codes, in Advances in Cryptology - Eurocrypt '89 (Lecture Notes in Computer Science), J.-J. Quisquater and J. Vandewalle, Eds. Berlin, Germany: Springer-Verlag, 1985, pp. 93-101.
-
Information Divergence Bounds for Authentication Codes
-
-
Sgarro, A.1
-
12
-
-
33749971869
-
-
R. A. Rueppel, Ed. Berlin, Germany: Springer-Verlag, 1992, pp. 467-471.
-
_, Advances in Cryptology - Eurocrypt '92 (Lecture Notes in Computer Science), R. A. Rueppel, Ed. Berlin, Germany: Springer-Verlag, 1992, pp. 467-471.
-
Advances in Cryptology - Eurocrypt '92 (Lecture Notes in Computer Science)
-
-
-
13
-
-
33749932936
-
-
J. Comput. Security, vol. 2, no. 1, pp. 53-63, 1993.
-
_, Information-theoretic bounds for authentication frauds, J. Comput. Security, vol. 2, no. 1, pp. 53-63, 1993.
-
Information-theoretic Bounds for Authentication Frauds
-
-
-
16
-
-
84983269168
-
-
in Advances in Cryptology - CRYPTO 84 (Lecture Notes in Computer Science), G. R. Blakley and D. Chaum, Eds. Berlin, Germany: Springer-Verlag, 1985, pp. 411-431.
-
G. J. Simmons, Authentication theory/coding theory, in Advances in Cryptology - CRYPTO 84 (Lecture Notes in Computer Science), G. R. Blakley and D. Chaum, Eds. Berlin, Germany: Springer-Verlag, 1985, pp. 411-431.
-
Authentication Theory/coding Theory
-
-
Simmons, G.J.1
-
17
-
-
33749902881
-
-
in Cryptography and Coding II, C. Mitchell, Ed. Oxford, U.K.: Clarendon, 1992, pp. 231-258.
-
G. J. Simmons and B. Smeets, A paradoxical result in unconditionally secure authentication codes - And an explanation, in Cryptography and Coding II, C. Mitchell, Ed. Oxford, U.K.: Clarendon, 1992, pp. 231-258.
-
A Paradoxical Result in Unconditionally Secure Authentication Codes - and An Explanation
-
-
Simmons, G.J.1
Smeets, B.2
-
19
-
-
33749925176
-
-
in Advances in Cryptology - Eurocrypt '90 (Lecture Notes in Computer Science), I. B. Damgård, Ed. Berlin, Germany: Springer-Verlag, 1991, pp. 306-312.
-
B. Smeets, P. Vanroose, and Z.-X. Wan, On the construction of authentication codes with secrecy and codes which stand against spoofing attacks of order L ≥ 2, in Advances in Cryptology - Eurocrypt '90 (Lecture Notes in Computer Science), I. B. Damgård, Ed. Berlin, Germany: Springer-Verlag, 1991, pp. 306-312.
-
On the Construction of Authentication Codes with Secrecy and Codes Which Stand Against Spoofing Attacks of Order L ≥ 2
-
-
Smeets, B.1
Vanroose, P.2
Wan, Z.-X.3
-
20
-
-
0023828936
-
-
J. Cryptol, vol. 1, no. 1, pp. 37-51, 1988.
-
D. R. Stinson, Some constructions and bounds for authentication codes, J. Cryptol, vol. 1, no. 1, pp. 37-51, 1988.
-
Some Constructions and Bounds for Authentication Codes
-
-
Stinson, D.R.1
-
21
-
-
0025594980
-
-
J. Cryptol., vol. 2, no. 3, pp. 131-143, 1990.
-
M. Walker, Information-theoretic bounds for authentication schemes, J. Cryptol., vol. 2, no. 3, pp. 131-143, 1990.
-
Information-theoretic Bounds for Authentication Schemes
-
-
Walker, M.1
|