메뉴 건너뛰기




Volumn 2015-June, Issue , 2015, Pages 2301-2305

Message Authentication Code over a wiretap channel

Author keywords

Authentication; information theoretical security; wiretap channel

Indexed keywords

AUTHENTICATION; COMMUNICATION CHANNELS (INFORMATION THEORY); INFORMATION THEORY;

EID: 84969753056     PISSN: 21578095     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2015.7282866     Document Type: Conference Paper
Times cited : (7)

References (19)
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct.
    • A. D. Wyner, "The wire-tap channel", Bell Syst. Tech. J., vol. 54, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J. , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 3
    • 84864117726 scopus 로고    scopus 로고
    • Physical layer authentication over MIMO fading wiretap channels
    • July
    • P. Baracca, N. Laurenti, and S. Tomasin, "Physical Layer Authentication over MIMO Fading Wiretap Channels", IEEE Transactions on Wireless Communications, vol. 11, no. 7, pp. 2564-2573, July 2012.
    • (2012) IEEE Transactions on Wireless Communications , vol.11 , Issue.7 , pp. 2564-2573
    • Baracca, P.1    Laurenti, N.2    Tomasin, S.3
  • 4
    • 84885016494 scopus 로고    scopus 로고
    • Performance evaluation of keyless authentication based on noisy channel
    • V. Gorodetsky, I. Kotenko and V. A. Skormin (Eds.), Springer-Verlag, Heidelberg
    • V. Korzhik, V. Yakovlev, G. M. Luna, R. Chesnokov, "Performance Evaluation of Keyless Authentication Based on Noisy Channel", MMM-ACNS 2007, CCIS 1, V. Gorodetsky, I. Kotenko and V. A. Skormin (Eds.), Springer-Verlag, Heidelberg, pp. 115-126, 2007.
    • (2007) MMM-ACNS 2007 CCIS 1 , pp. 115-126
    • Korzhik, V.1    Yakovlev, V.2    Luna, G.M.3    Chesnokov, R.4
  • 7
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár, et al., "Broadcast channels with confidential messages", IEEE Trans. Inf. Theory, vol. 24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1
  • 8
    • 33750056552 scopus 로고    scopus 로고
    • Almost independence and secrecy capacity
    • Jan.
    • I. Csiszár, "Almost independence and secrecy capacity", Probl. Inf. Transm., vol. 32, pp. 40-47, Jan. 1996.
    • (1996) Probl. Inf. Transm. , vol.32 , pp. 40-47
    • Csiszár, I.1
  • 9
    • 0031701886 scopus 로고    scopus 로고
    • Common randomness in information theory and cryptography, Part II: CR capacity
    • Jan.
    • R. Ahlswede and I. Csiszár, "Common randomness in information theory and cryptography, Part II: CR capacity", IEEE Trans. Inf. Theory, vol. 44, no. 1, pp. 225-240, Jan. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.1 , pp. 225-240
    • Ahlswede, R.1    Csiszár, I.2
  • 11
    • 84983269168 scopus 로고
    • Authentication theory/coding theory
    • LNCS
    • G. J. Simmons, "Authentication theory/coding theory", Proc. CRYPTO'84, vol. LNCS-196, pp. 411-431, 1985.
    • (1985) Proc. CRYPTO'84 , vol.196 , pp. 411-431
    • Simmons, G.J.1
  • 12
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • U. M. Maurer, "Authentication theory and hypothesis testing", IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.M.1
  • 13
    • 0037396695 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels-Part I: Definitions and a completeness result", IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 822-831, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 822-831
    • Maurer, U.M.1    Wolf, S.2
  • 14
    • 0037399113 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated public channels II: The simulatability condition
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated public channels II: The simulatability condition", IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 15
    • 0037396951 scopus 로고    scopus 로고
    • Secret-key agreement over unauthenticated publicchannels-Part III: Privacy amplification
    • U. M. Maurer and S. Wolf, "Secret-key agreement over unauthenticated publicchannels-Part III: Privacy amplification", IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 832-838, 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.4 , pp. 832-838
    • Maurer, U.M.1    Wolf, S.2
  • 16
    • 84863913546 scopus 로고    scopus 로고
    • Physical-Layer secrecy for OFDM transmissions over fading channels
    • F. Renna, N. Laurenti, H. V. Poor, "Physical-Layer Secrecy for OFDM Transmissions Over Fading Channels, " IEEE Trans. on Inform. Forens. and Security, vol. 7, no. 4, pp. 1354-1367, 2012.
    • (2012) IEEE Trans. on Inform. Forens. and Security , vol.7 , Issue.4 , pp. 1354-1367
    • Renna, F.1    Laurenti, N.2    Poor, H.V.3
  • 17
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • J. L. Carter, et al., "Universal classes of hash functions", Journal of computer and system sciences, vol. 18, no. 2, pp. 143-154, 1979.
    • (1979) Journal of Computer and System Sciences , vol.18 , Issue.2 , pp. 143-154
    • Carter, J.L.1
  • 18
    • 0000410707 scopus 로고
    • Universal hashing and authentication codes
    • D. R. Stinson, "Universal hashing and authentication codes", Designs, Codes, Cryptogr., vol. 4, no. 3, pp. 369-380 1994.
    • (1994) Designs, Codes, Cryptogr. , vol.4 , Issue.3 , pp. 369-380
    • Stinson, D.R.1
  • 19
    • 61349140043 scopus 로고    scopus 로고
    • Authentication over noisy channels
    • Feb. 2009
    • L. Lai, H. ElGamal, et al., "Authentication Over Noisy Channels", IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009
    • IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 906-916
    • Lai, L.1    ElGamal, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.