-
2
-
-
0001078413
-
A few results in message authentication
-
E.F. Brickell, A few results in message authentication, Congressus Numerantium, vol. 43, pp. 141-154, 1984.
-
(1984)
Congressus Numerantium
, vol.43
, pp. 141-154
-
-
Brickell, E.F.1
-
3
-
-
0011321632
-
Repeated use of codes which detect deception
-
V. Fåk, Repeated use of codes which detect deception, IEEE Drans. on Information Theory, Vol. 25, No. 2, 1979, pp. 233-234.
-
(1979)
IEEE Drans. on Information Theory
, vol.25
, Issue.2
, pp. 233-234
-
-
Fåk, V.1
-
4
-
-
0016038540
-
Codes which detect deception
-
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception, Bell Syst. Tech. J., Vol. 53, No. 3, 1974, pp. 405-424.
-
(1974)
Bell Syst. Tech. J
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.N.1
MacWilliams, F.J.2
Sloane, N.J.A.3
-
5
-
-
0026191173
-
Strengthening Simmons' bound on impersonation
-
R. Johannesson and A. Sgarro, Strengthening Simmons' bound on impersonation, IEEE Trans, on Information Theory, Vol. 37, No. 4, 1991, pp. 1182-1185.
-
(1991)
IEEE Trans, on Information Theory
, vol.37
, Issue.4
, pp. 1182-1185
-
-
Johannesson, R.1
Sgarro, A.2
-
6
-
-
0028514178
-
Lower bounds on the probability of deception in authentication with arbitration
-
T. Johansson, Lower bounds on the probability of deception in authentication with arbitration, IEEE Trans, on Information Theory, Vol. 40, No. 5, 1994, pp. 1573-1585.
-
(1994)
IEEE Trans, on Information Theory
, vol.40
, Issue.5
, pp. 1573-1585
-
-
Johansson, T.1
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
9
-
-
0027607095
-
A lower bound on authentication after having observed a sequence of messages
-
U. Rosenbaum, A lower bound on authentication after having observed a sequence of messages, J. of Cryptology, Vol. 6, No. 3, 1993, pp. 135-156.
-
(1993)
J. of Cryptology
, vol.6
, Issue.3
, pp. 135-156
-
-
Rosenbaum, U.1
-
10
-
-
34748820273
-
Information divergence bounds for authentication codes
-
J.-J. Quisquater and J. Vandewalle (Eds.), Lecture Notes in Computer Science, No. 434. Berlin: Springer Verlag
-
A. Sgarro, Information divergence bounds for authentication codes, Advances in Cryptology-Eurocrypt '89, J.-J. Quisquater and J. Vandewalle (Eds.), Lecture Notes in Computer Science, No. 434. Berlin: Springer Verlag, 1985, pp. 93-101.
-
(1985)
Advances in Cryptology-Eurocrypt '89
, pp. 93-101
-
-
Sgarro, A.1
-
11
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, Oct. 1949, pp. 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
12
-
-
84983269168
-
Authentication theory/coding theory
-
G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag
-
G. J. Simmons, Authentication theory/coding theory, in Advances in Cryptology-CRYPTO 84, G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag, 1985, pp. 411-431.
-
(1985)
Advances in Cryptology-CRYPTO 84
, pp. 411-431
-
-
Simmons, G.J.1
-
13
-
-
84946244154
-
A paradoxical result in unconditionally secure authentication codes-and an explanation
-
C. Mitchell, Ed., Oxford: Clarendon
-
G.J. Simmons and B. Smeets, A paradoxical result in unconditionally secure authentication codes-and an explanation, in Cryptography and Coding II, C. Mitchell, Ed., Oxford: Clarendon, 1992, pp. 231-258.
-
(1992)
Cryptography and Coding II
, pp. 231-258
-
-
Simmons, G.J.1
Smeets, B.2
-
14
-
-
0028514064
-
Bounds on the Probability of Deception in Multiple Authentication
-
B. Smeets, Bounds on the Probability of Deception in Multiple Authentication, IEEE Trans, on Information Theory, Vol. 40, No. 5, 1994, pp. 1586-1591.
-
(1994)
IEEE Trans, on Information Theory
, vol.40
, Issue.5
, pp. 1586-1591
-
-
Smeets, B.1
-
15
-
-
33749925176
-
On the construction of authentication codes with secrecy and codes which stand against spoofing attacks of order L > 2
-
I.B. Damgård, Ed., Lecture Notes in Computer Science, No. 473, Berlin: Springer Verlag
-
B. Smeets, P. Vanroose, and Zhe-Xian Wan, On the construction of authentication codes with secrecy and codes which stand against spoofing attacks of order L > 2, Advances in Cryptology-Eurocrypt '90, I.B. Damgård, Ed., Lecture Notes in Computer Science, No. 473, Berlin: Springer Verlag, 1991, pp.306-312.
-
(1991)
Advances in Cryptology-Eurocrypt '90
, pp. 306-312
-
-
Smeets, B.1
Vanroose, P.2
Wan, Z.-X.3
-
16
-
-
0023828936
-
Some constructions and bounds for authentication codes
-
D. R. Stinson, Some constructions and bounds for authentication codes, J. of Cryptology, Vol. 1, No. 1, 1988, pp 37-51.
-
(1988)
J. of Cryptology
, vol.1
, Issue.1
, pp. 37-51
-
-
Stinson, D.R.1
-
17
-
-
0025594980
-
Information-theoretic bounds for authentication schemes
-
M. Walker, Information-theoretic bounds for authentication schemes, J. of Cryptology, Vol 2, No. 3, 1990, pp. 131-143.
-
(1990)
J. of Cryptology
, vol.2
, Issue.3
, pp. 131-143
-
-
Walker, M.1
|