-
1
-
-
0000057495
-
Universal hashing and geometric codes
-
J. Bierbrauer, "Universal hashing and geometric codes," Des, Codes Cryptogr., vol. 11, pp. 207-221, 1997.
-
(1997)
Des, Codes Cryptogr.
, vol.11
, pp. 207-221
-
-
Bierbrauer, J.1
-
2
-
-
84974696785
-
On families of hash functions via geometric codes and concatenation
-
Advances in Cryptology - CRYPTO'93. Berlin, Germany: Springer-Verlag
-
J. Bierbrauer, T. Johansson, G. Kabatianskii, and B. Smeets, "On families of hash functions via geometric codes and concatenation," in Advances in Cryptology - CRYPTO'93 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1994, vol. 773, pp. 331-342.
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 331-342
-
-
Bierbrauer, J.1
Johansson, T.2
Kabatianskii, G.3
Smeets, B.4
-
3
-
-
0001078413
-
A few results in message authentication
-
E. F. Brickell, "A few results in message authentication," Congressus Numerantium, vol. 43, pp. 141-154, 1984.
-
(1984)
Congressus Numerantium
, vol.43
, pp. 141-154
-
-
Brickell, E.F.1
-
4
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, pp. 143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
5
-
-
0013259203
-
A simple and key-economical unconditional authentication scheme
-
B. den Boer, "A simple and key-economical unconditional authentication scheme," J. Comput. Security, vol. 2, pp. 65-71, 1993.
-
(1993)
J. Comput. Security
, vol.2
, pp. 65-71
-
-
Den Boer, B.1
-
6
-
-
85032188633
-
Society and group oriented cryptology: A new concept
-
Advances in Cryptography - CRYPTO '87. Berlin, Germany: Sprilnger-Verlag
-
Y. Desmedt, "Society and group oriented cryptology: A new concept," in Advances in Cryptography - CRYPTO '87 (Lecture Notes in Computer Science). Berlin, Germany: Sprilnger-Verlag, 1988, vol. 293, pp. 120-127.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
7
-
-
0026992399
-
Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback
-
Y. Desmedt, Y. Frankel, and M. Yung, "Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback," in Proc. IEEE INFOCOM'92, 1992, pp. 2045-2054.
-
(1992)
Proc. IEEE INFOCOM'92
, pp. 2045-2054
-
-
Desmedt, Y.1
Frankel, Y.2
Yung, M.3
-
8
-
-
0345234062
-
Unconditionally secure group authentication
-
M. van Dijk, C. Gehrmann, and B. Smeets, "Unconditionally secure group authentication," Des., Codes Cryptogr., vol. 14, pp. 281-296, 1998.
-
(1998)
Des., Codes Cryptogr.
, vol.14
, pp. 281-296
-
-
Van Dijk, M.1
Gehrmann, C.2
Smeets, B.3
-
9
-
-
0021941233
-
Theory of codes with maximum rank distance
-
E. M. Gabidulin, "Theory of codes with maximum rank distance," Probl. Inform. Transm., vol. 21, no. 1, pp. 1-12, 1985.
-
(1985)
Probl. Inform. Transm.
, vol.21
, Issue.1
, pp. 1-12
-
-
Gabidulin, E.M.1
-
10
-
-
0016038540
-
Codes which detect deception
-
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, "Codes which detect deception," Bell Syst. Tech. J., vol. 33, pp. 405-424, 1974.
-
(1974)
Bell Syst. Tech. J.
, vol.33
, pp. 405-424
-
-
Gilbert, E.N.1
MacWilliams, F.J.2
Sloane, N.J.A.3
-
11
-
-
0004199517
-
-
Ph.D. dissertation, Lund Univ., Lund, Sweden
-
T. Johansson, "Contributions to unconditionally secure authentication," Ph.D. dissertation, Lund Univ., Lund, Sweden, 1994.
-
(1994)
Contributions to Unconditionally Secure Authentication
-
-
Johansson, T.1
-
12
-
-
0000608701
-
Authentication codes for nontrusting parties obtained from rank metric codes
-
_, "Authentication codes for nontrusting parties obtained from rank metric codes," Des., Codes Cryptogr., vol. 6, pp. 205-218, 1995.
-
(1995)
Des., Codes Cryptogr.
, vol.6
, pp. 205-218
-
-
-
13
-
-
0001925043
-
Further results on asymmetric authentication schemes
-
_, "Further results on asymmetric authentication schemes," Inform. Comput., vol. 151, no. 1/2, pp. 100-133, 1999.
-
(1999)
Inform. Comput.
, vol.151
, Issue.1-2
, pp. 100-133
-
-
-
14
-
-
0030106709
-
On the cardinality of systematic authentication codes via error correcting
-
Mar.
-
G. Kabatianskii, B. Smeets, and T. Johansson, "On the cardinality of systematic authentication codes via error correcting," IEEE Trans. Inform. Theory, vol. 42, pp. 566-578, Mar. 1996.
-
(1996)
IEEE Trans. Inform. Theory
, vol.42
, pp. 566-578
-
-
Kabatianskii, G.1
Smeets, B.2
Johansson, T.3
-
16
-
-
21944444884
-
Multisender authentication schemes with unconditional security
-
Information and Communications Security. Berlin, Germany: Springer-Verlag
-
K. Martin and R. Safavi-Naini, "Multisender authentication schemes with unconditional security," in Information and Communications Security (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1997, vol. 1334, pp. 130-143.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 130-143
-
-
Martin, K.1
Safavi-Naini, R.2
-
17
-
-
0345234066
-
Three systems for shared generation of authenticators
-
R. Safavi-Naini, "Three systems for shared generation of authenticators," Des., Codes Cryptogr., vol. 13, 1998.
-
(1998)
Des., Codes Cryptogr.
, vol.13
-
-
Safavi-Naini, R.1
-
18
-
-
84957715332
-
New results on multi-receiver authentication codes
-
Advances in Cryptology - Eurbcrypt '98. Berlin, Germany: Springer-Verlag
-
R. Safavi-Naini and H. Wang, "New results on multi-receiver authentication codes," in Advances in Cryptology - Eurbcrypt '98 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1998, vol. 1438, pp. 527-541.
-
(1998)
Lecture Notes in Computer Science
, vol.1438
, pp. 527-541
-
-
Safavi-Naini, R.1
Wang, H.2
-
19
-
-
0001531989
-
Multireceiver authentication codes: Models, bounds, constructions and extensions
-
_, "Multireceiver authentication codes: Models, bounds, constructions and extensions," Inform. Comput., vol. 151, no. 1/2, pp. 148-172, 1999.
-
(1999)
Inform. Comput.
, vol.151
, Issue.1-2
, pp. 148-172
-
-
-
20
-
-
23044523764
-
Fail-stop signature for long messages
-
Indocrypt'00. Berlin, Germany: Springer-Verlag
-
R. Safavi-Naini, W. Susilo, and H. Wang, "Fail-stop signature for long messages," in Indocrypt'00 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2000, vol. 1977, pp. 165-177.
-
(2000)
Lecture Notes in Computer Science
, vol.1977
, pp. 165-177
-
-
Safavi-Naini, R.1
Susilo, W.2
Wang, H.3
-
21
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
84983269168
-
Authentication theory/coding theory
-
Advances in Cryptology-Crypto '84. Berlin, Germany: Springer-Verlag
-
G. J. Simmons, "Authentication theory/coding theory," in Advances in Cryptology-Crypto '84 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1984, vol. 196, pp. 411-431.
-
(1984)
Lecture Notes in Computer Science
, vol.196
, pp. 411-431
-
-
Simmons, G.J.1
-
23
-
-
0003038453
-
A survey of information authentication
-
G. J. Simmons, Ed. Piscataway, NJ: IEEE Press
-
_, "A survey of information authentication," in Contemporary Cryptology, The Science of Information Integrity, G. J. Simmons, Ed. Piscataway, NJ: IEEE Press, 1992, pp. 379-419.
-
(1992)
Contemporary Cryptology, The Science of Information Integrity
, pp. 379-419
-
-
-
24
-
-
33749925176
-
On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
-
Advances in Cryptology-Eurocrypt '90. Berlin, Germany: Springer-Verlag
-
B. Smeets, P. Vanroose, and Z.-X. Wan, "On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2," in Advances in Cryptology-Eurocrypt '90 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1990, vol. 473, pp. 306-312.
-
(1990)
Lecture Notes in Computer Science
, vol.473
, pp. 306-312
-
-
Smeets, B.1
Vanroose, P.2
Wan, Z.-X.3
-
25
-
-
0025212061
-
The combinatorics of authentication and secrecy codes
-
D. R. Stinson, "The combinatorics of authentication and secrecy codes," J. Cryptol., vol. 2, pp. 23-49, 1990.
-
(1990)
J. Cryptol.
, vol.2
, pp. 23-49
-
-
Stinson, D.R.1
-
26
-
-
0000410707
-
Universal hashing and authentication codes
-
_, "Universal hashing and authentication codes," Codes Cryptogr., vol. 4, pp. 369-380, 1994.
-
(1994)
Codes Cryptogr.
, vol.4
, pp. 369-380
-
-
-
27
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality," J. Comput. Syst. Sci., vol. 22, pp. 265-279, 1981.
-
(1981)
J. Comput. Syst. Sci.
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
28
-
-
0034188404
-
Constructions of authentication codes from algebraic curves over finite fields
-
May
-
C. Xing, H. Wang, and K. Y. Lam, "Constructions of authentication codes from algebraic curves over finite fields," IEEE Trans. Inform. Theory, vol. 46, pp. 886-892, May 2000.
-
(2000)
IEEE Trans. Inform. Theory
, vol.46
, pp. 886-892
-
-
Xing, C.1
Wang, H.2
Lam, K.Y.3
|