메뉴 건너뛰기




Volumn 15, Issue 1, 1998, Pages 87-100

New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes

Author keywords

Authentication Code; Bounds; Cryptography; Key predistribution scheme

Indexed keywords


EID: 0242621246     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1008229625895     Document Type: Article
Times cited : (12)

References (10)
  • 1
    • 1842705060 scopus 로고    scopus 로고
    • Private communication
    • A. Beimel, Private communication, (1997).
    • (1997)
    • Beimel, A.1
  • 2
    • 84979069644 scopus 로고
    • Bounds on orthogonal arrays and resilient functions
    • J. Bierbrauer, Bounds on orthogonal arrays and resilient functions, Journal of Combinatorial Designs, Vol. 3 (1995) pp. 179-183.
    • (1995) Journal of Combinatorial Designs , vol.3 , pp. 179-183
    • Bierbrauer, J.1
  • 3
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • Proceedings of EUROCRYPT '84
    • R. Blom, An optimal class of symmetric key generation systems, Lecture Notes in Computer Science, Vol. 209 (1984) pp. 335-338 (Proceedings of EUROCRYPT '84).
    • (1984) Lecture Notes in Computer Science , vol.209 , pp. 335-338
    • Blom, R.1
  • 7
    • 0037775869 scopus 로고    scopus 로고
    • Combinatorial characterizations of authentication codes II
    • R. S. Rees and D. R. Stinson, Combinatorial characterizations of authentication codes II, Designs, Codes and Cryptography, Vol. 7 (1996) pp. 239-259.
    • (1996) Designs, Codes and Cryptography , vol.7 , pp. 239-259
    • Rees, R.S.1    Stinson, D.R.2
  • 9
    • 0025212061 scopus 로고
    • The combinatorics of authentication and secrecy codes
    • D. R. Stinson, The combinatorics of authentication and secrecy codes, Journal of Cryptology, Vol. 2 (1990) pp. 23-49.
    • (1990) Journal of Cryptology , vol.2 , pp. 23-49
    • Stinson, D.R.1
  • 10
    • 0038452683 scopus 로고
    • Combinatorial characterizations of authentication codes
    • D. R. Stinson, Combinatorial characterizations of authentication codes, Designs, Codes and Cryptography, Vol. 2 (1992) pp. 175-187.
    • (1992) Designs, Codes and Cryptography , vol.2 , pp. 175-187
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.