메뉴 건너뛰기




Volumn 1046, Issue , 1996, Pages 387-398

A unified and generalized treatment of authentication theory

Author keywords

Cryptography; Information theory; Unconditionally secure authentication

Indexed keywords

AUTHENTICATION; INFORMATION THEORY;

EID: 84938858421     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-60922-9_32     Document Type: Conference Paper
Times cited : (36)

References (17)
  • 2
    • 0001078413 scopus 로고
    • A few results in message authentication
    • E.F. Brickell, A few results in message authentication, Congressus Numerantium, vol. 43, pp. 141-154, 1984.
    • (1984) Congressus Numerantium , vol.43 , pp. 141-154
    • Brickell, E.F.1
  • 3
    • 0011321632 scopus 로고
    • Repeated use of codes which detect deception
    • V. Fåk, Repeated use of codes which detect deception, IEEE Drans. on Information Theory, Vol. 25, No. 2, 1979, pp. 233-234.
    • (1979) IEEE Drans. on Information Theory , vol.25 , Issue.2 , pp. 233-234
    • Fåk, V.1
  • 5
    • 0026191173 scopus 로고
    • Strengthening Simmons' bound on impersonation
    • R. Johannesson and A. Sgarro, Strengthening Simmons' bound on impersonation, IEEE Trans, on Information Theory, Vol. 37, No. 4, 1991, pp. 1182-1185.
    • (1991) IEEE Trans, on Information Theory , vol.37 , Issue.4 , pp. 1182-1185
    • Johannesson, R.1    Sgarro, A.2
  • 6
    • 0028514178 scopus 로고
    • Lower bounds on the probability of deception in authentication with arbitration
    • T. Johansson, Lower bounds on the probability of deception in authentication with arbitration, IEEE Trans, on Information Theory, Vol. 40, No. 5, 1994, pp. 1573-1585.
    • (1994) IEEE Trans, on Information Theory , vol.40 , Issue.5 , pp. 1573-1585
    • Johansson, T.1
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, No. 2, 1978, pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 9
    • 0027607095 scopus 로고
    • A lower bound on authentication after having observed a sequence of messages
    • U. Rosenbaum, A lower bound on authentication after having observed a sequence of messages, J. of Cryptology, Vol. 6, No. 3, 1993, pp. 135-156.
    • (1993) J. of Cryptology , vol.6 , Issue.3 , pp. 135-156
    • Rosenbaum, U.1
  • 10
    • 34748820273 scopus 로고
    • Information divergence bounds for authentication codes
    • J.-J. Quisquater and J. Vandewalle (Eds.), Lecture Notes in Computer Science, No. 434. Berlin: Springer Verlag
    • A. Sgarro, Information divergence bounds for authentication codes, Advances in Cryptology-Eurocrypt '89, J.-J. Quisquater and J. Vandewalle (Eds.), Lecture Notes in Computer Science, No. 434. Berlin: Springer Verlag, 1985, pp. 93-101.
    • (1985) Advances in Cryptology-Eurocrypt '89 , pp. 93-101
    • Sgarro, A.1
  • 11
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, Communication theory of secrecy systems, Bell System Technical Journal, Vol. 28, Oct. 1949, pp. 656-715.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 12
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag
    • G. J. Simmons, Authentication theory/coding theory, in Advances in Cryptology-CRYPTO 84, G.R. Blakley and D. Chaum (Eds.), Lecture Notes in Computer Science, No. 196, Berlin: Springer Verlag, 1985, pp. 411-431.
    • (1985) Advances in Cryptology-CRYPTO 84 , pp. 411-431
    • Simmons, G.J.1
  • 13
    • 84946244154 scopus 로고
    • A paradoxical result in unconditionally secure authentication codes-and an explanation
    • C. Mitchell, Ed., Oxford: Clarendon
    • G.J. Simmons and B. Smeets, A paradoxical result in unconditionally secure authentication codes-and an explanation, in Cryptography and Coding II, C. Mitchell, Ed., Oxford: Clarendon, 1992, pp. 231-258.
    • (1992) Cryptography and Coding II , pp. 231-258
    • Simmons, G.J.1    Smeets, B.2
  • 14
    • 0028514064 scopus 로고
    • Bounds on the Probability of Deception in Multiple Authentication
    • B. Smeets, Bounds on the Probability of Deception in Multiple Authentication, IEEE Trans, on Information Theory, Vol. 40, No. 5, 1994, pp. 1586-1591.
    • (1994) IEEE Trans, on Information Theory , vol.40 , Issue.5 , pp. 1586-1591
    • Smeets, B.1
  • 15
    • 33749925176 scopus 로고
    • On the construction of authentication codes with secrecy and codes which stand against spoofing attacks of order L > 2
    • I.B. Damgård, Ed., Lecture Notes in Computer Science, No. 473, Berlin: Springer Verlag
    • B. Smeets, P. Vanroose, and Zhe-Xian Wan, On the construction of authentication codes with secrecy and codes which stand against spoofing attacks of order L > 2, Advances in Cryptology-Eurocrypt '90, I.B. Damgård, Ed., Lecture Notes in Computer Science, No. 473, Berlin: Springer Verlag, 1991, pp.306-312.
    • (1991) Advances in Cryptology-Eurocrypt '90 , pp. 306-312
    • Smeets, B.1    Vanroose, P.2    Wan, Z.-X.3
  • 16
    • 0023828936 scopus 로고
    • Some constructions and bounds for authentication codes
    • D. R. Stinson, Some constructions and bounds for authentication codes, J. of Cryptology, Vol. 1, No. 1, 1988, pp 37-51.
    • (1988) J. of Cryptology , vol.1 , Issue.1 , pp. 37-51
    • Stinson, D.R.1
  • 17
    • 0025594980 scopus 로고
    • Information-theoretic bounds for authentication schemes
    • M. Walker, Information-theoretic bounds for authentication schemes, J. of Cryptology, Vol 2, No. 3, 1990, pp. 131-143.
    • (1990) J. of Cryptology , vol.2 , Issue.3 , pp. 131-143
    • Walker, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.