메뉴 건너뛰기




Volumn 184, Issue 1, 2003, Pages 93-108

Logarithm Cartesian authentication codes

Author keywords

Authentication codes; Cryptography; Cyclotomy

Indexed keywords

CRYPTOGRAPHY; FUNCTION EVALUATION; PROBABILITY; THEOREM PROVING;

EID: 0038466305     PISSN: 08905401     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0890-5401(03)00053-1     Document Type: Article
Times cited : (17)

References (14)
  • 2
    • 85009212767 scopus 로고    scopus 로고
    • Cartesian authentication codes from functions with optimal nonlinearity
    • S. Chanson, C. Ding, A. Salomaa, Cartesian authentication codes from functions with optimal nonlinearity, Theoretical Computer Science 290 (2003) 1737-1752.
    • (2003) Theoretical Computer Science , vol.290 , pp. 1737-1752
    • Chanson, S.1    Ding, C.2    Salomaa, A.3
  • 8
    • 0037775869 scopus 로고    scopus 로고
    • Combinatorial characterizations of authentication codes II
    • R.S. Rees, D. R. Stinson, Combinatorial characterizations of authentication codes II, Design, Codes, and Cryptography 7 (1996) 239-259.
    • (1996) Design, Codes, and Cryptography , vol.7 , pp. 239-259
    • Rees, R.S.1    Stinson, D.R.2
  • 10
    • 0001531989 scopus 로고    scopus 로고
    • Multi-receiver authentication codes: Models, bounds, constructions, and extensions
    • R. Safavi-Naini, H. Wang, Multi-receiver authentication codes: models, bounds, constructions, and extensions, Information and Computation 151 (1999) 148-172.
    • (1999) Information and Computation , vol.151 , pp. 148-172
    • Safavi-Naini, R.1    Wang, H.2
  • 12
    • 0038452683 scopus 로고
    • Combinatorial characterizations of authentication codes
    • D.R. Stinson, Combinatorial characterizations of authentication codes, Designs, Codes, and Cryptography 2 (1992) 175-187.
    • (1992) Designs, Codes, and Cryptography , vol.2 , pp. 175-187
    • Stinson, D.R.1
  • 13
    • 0034188404 scopus 로고    scopus 로고
    • Construction of authentication codes from algebraic curves over finite fields
    • C. Xing, H. Wang, K.Y. Lam, Construction of authentication codes from algebraic curves over finite fields, IEEE Transactions on Information Theory 46 (2000) 886-892.
    • (2000) IEEE Transactions on Information Theory , vol.46 , pp. 886-892
    • Xing, C.1    Wang, H.2    Lam, K.Y.3
  • 14
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M.N. Wegman, J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22 (1981) 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.