메뉴 건너뛰기




Volumn , Issue , 2006, Pages 246-251

The BCH-NTMAC for noisy message authentication

Author keywords

BCH NTMAC; Error estimate; False acceptance

Indexed keywords

AUTHENTICATION; COMMUNICATION CHANNELS (INFORMATION THEORY); CRYPTOGRAPHY; ERROR ANALYSIS; FUNCTIONS; MEDIUM ACCESS CONTROL;

EID: 44049086664     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CISS.2006.286472     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 7
    • 44049108799 scopus 로고    scopus 로고
    • G. Di Crescenzo, R. Graveman, G. R. Arce, and R. Ge, A formal security analysis of approximate message auhentication codes, Proceedings of CTA Communications and Networks, College Park, MD, pp. 217-221, Apr 2003.
    • G. Di Crescenzo, R. Graveman, G. R. Arce, and R. Ge, "A formal security analysis of approximate message auhentication codes," Proceedings of CTA Communications and Networks, vol. College Park, MD, pp. 217-221, Apr 2003.
  • 16
    • 0027612155 scopus 로고
    • Optimization of cyclic redundancy-check codes with 24 and 32 parity bits
    • June
    • G. Gastagnoli, S. Brauer, and M. Herrmann, "Optimization of cyclic redundancy-check codes with 24 and 32 parity bits," IEEE Transaction on Communications, vol. 41, pp. 883-892, June 1993.
    • (1993) IEEE Transaction on Communications , vol.41 , pp. 883-892
    • Gastagnoli, G.1    Brauer, S.2    Herrmann, M.3
  • 17
    • 0001820140 scopus 로고
    • Cryptography and computer privacy
    • May
    • H. Feistel, "Cryptography and computer privacy," Scientific American, vol. 228, pp. 15-23, May 1973.
    • (1973) Scientific American , vol.228 , pp. 15-23
    • Feistel, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.