-
2
-
-
85009212767
-
Cartesian authentication codes from functions with optimal nonlinearity
-
S. Chanson, C. Ding, A. Salomaa, Cartesian authentication codes from functions with optimal nonlinearity, Theoretical Computer Science 290 (2003) 1737-1752.
-
(2003)
Theoretical Computer Science
, vol.290
, pp. 1737-1752
-
-
Chanson, S.1
Ding, C.2
Salomaa, A.3
-
3
-
-
0004151023
-
-
North-Holland Mathematical Library
-
T.W. Cusick, C. Ding, A. Renvall, in: Stream Ciphers and Number Theory, North-Holland Mathematical Library, vol. 55, North-Holland/Elsevier, Amsterdam, 1998.
-
(1998)
Stream Ciphers and Number Theory
, vol.55
-
-
Cusick, T.W.1
Ding, C.2
Renvall, A.3
-
6
-
-
84955569997
-
Universal hash functions from exponential sums over finite fields and Galois rings
-
Springer, New York
-
T. Helleseth, T. Johansson, Universal hash functions from exponential sums over finite fields and Galois rings, in: Advances in Cryptology - Crypto' 96, Lecture Notes in Computer Science, vol. 1109, Springer, New York, 1997.
-
(1997)
Advances in Cryptology - Crypto' 96, Lecture Notes in Computer Science
, vol.1109
-
-
Helleseth, T.1
Johansson, T.2
-
7
-
-
84957875373
-
Characterization of (k, n) multi-receiver authentication
-
Springer, New York
-
K. Kurosawa, S. Obana, Characterization of (k, n) multi-receiver authentication, in: Information Security and Privacy: Proceedings of ACISP' 97, Lecture Notes in Computer Science, vol. 1270, Springer, New York, 1997, pp. 204-215.
-
(1997)
Information Security and Privacy: Proceedings of ACISP' 97, Lecture Notes in Computer Science
, vol.1270
, pp. 204-215
-
-
Kurosawa, K.1
Obana, S.2
-
8
-
-
0037775869
-
Combinatorial characterizations of authentication codes II
-
R.S. Rees, D. R. Stinson, Combinatorial characterizations of authentication codes II, Design, Codes, and Cryptography 7 (1996) 239-259.
-
(1996)
Design, Codes, and Cryptography
, vol.7
, pp. 239-259
-
-
Rees, R.S.1
Stinson, D.R.2
-
9
-
-
84957715332
-
New results on multi-receiver authentication codes
-
Springer, New York
-
R. Safavi-Naini, H. Wang, New results on multi-receiver authentication codes, in: Advances in Cryptology: Proceedings of Eurocrypt' 98, Lecture Notes in Computer Science, vol. 1403, Springer, New York, 1998, pp. 527-541.
-
(1998)
Advances in Cryptology: Proceedings of Eurocrypt' 98, Lecture Notes in Computer Science
, vol.1403
, pp. 527-541
-
-
Safavi-Naini, R.1
Wang, H.2
-
10
-
-
0001531989
-
Multi-receiver authentication codes: Models, bounds, constructions, and extensions
-
R. Safavi-Naini, H. Wang, Multi-receiver authentication codes: models, bounds, constructions, and extensions, Information and Computation 151 (1999) 148-172.
-
(1999)
Information and Computation
, vol.151
, pp. 148-172
-
-
Safavi-Naini, R.1
Wang, H.2
-
11
-
-
84983269168
-
Authentication theory/coding theor
-
Springer, New York
-
G.J. Simmons, Authentication theory/coding theor, in: Advances in Cryptology: Proceedings of Crypto' 84, Lecture Notes in Computer Science, vol. 196, Springer, New York, 1985, pp. 411-432.
-
(1985)
Advances in Cryptology: Proceedings of Crypto' 84, Lecture Notes in Computer Science
, vol.196
, pp. 411-432
-
-
Simmons, G.J.1
-
12
-
-
0038452683
-
Combinatorial characterizations of authentication codes
-
D.R. Stinson, Combinatorial characterizations of authentication codes, Designs, Codes, and Cryptography 2 (1992) 175-187.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 175-187
-
-
Stinson, D.R.1
-
13
-
-
0034188404
-
Construction of authentication codes from algebraic curves over finite fields
-
C. Xing, H. Wang, K.Y. Lam, Construction of authentication codes from algebraic curves over finite fields, IEEE Transactions on Information Theory 46 (2000) 886-892.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 886-892
-
-
Xing, C.1
Wang, H.2
Lam, K.Y.3
-
14
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M.N. Wegman, J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22 (1981) 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|