-
1
-
-
0018456171
-
Universal Classes of Hash Functions
-
J.L. Carter, M.N. Wegman, “Universal Classes of Hash Functions”, J. Computer and System Set., Vol. 18, 1979, pp. 143-154.
-
(1979)
J. Computer and System Set
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
2
-
-
85028764043
-
-
University of Nebraska-Lincoln. Department of Computer Science and Engineering
-
D.R. Stinson, Combinatorial techniques for universal hashing, University of Nebraska-Lincoln. Department of Computer Science and Engineering, 1990.
-
(1990)
Combinatorial techniques for universal hashing
-
-
Stinson, D.R.1
-
3
-
-
0003038453
-
A survey of Information Authentication
-
G.J. Simmons, IEEE Press, New York
-
G.J. Simmons, “A survey of Information Authentication”, in Contemporary Cryptology, The science of information integrity, ed. G.J. Simmons, IEEE Press, New York, 1992.
-
(1992)
Contemporary Cryptology, The science of information integrity
-
-
Simmons, G.J.1
-
4
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M.N. Wegman, J.L. Carter, “New hash functions and their use in authentication and set equality”, J. Computer and System Sciences, Vol. 22, 1981, pp. 265-279.
-
(1981)
J. Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
-
5
-
-
0023985539
-
Privacy amplification by public discussion
-
C.H. Bennett, G. Brassard, J-M. Roberts, “Privacy amplification by public discussion”, SIAM J.Comput., Vol. 17:2, 1988, pp. 210-229.
-
(1988)
SIAM J.Comput
, vol.17
, Issue.2
, pp. 210-229
-
-
Bennett, C.H.1
Brassard, G.2
Roberts, J.-M.3
-
6
-
-
0344818561
-
-
to appear in IEEE Transactions on Information Theory. This is a final version of [7]
-
D.R. Stinson, “Universal Hashing and Authentication Codes”, to appear in IEEE Transactions on Information Theory. This is a final version of [7]
-
Universal Hashing and Authentication Codes
-
-
Stinson, D.R.1
-
7
-
-
0344818561
-
Universal hashing and authentication codes
-
Santa Barbara, USA
-
D. R. Stinson, “Universal hashing and authentication codes” Proceedings of Crypto 91, Santa Barbara, USA, 1991, pp. 74-85.
-
(1991)
Proceedings of Crypto 91
, pp. 74-85
-
-
Stinson, D.R.1
-
14
-
-
0026151644
-
Which linear codes are algebraic-geometric?
-
R. Pellikaan, B.Z. Shen, and G.J.M. van Wee, “Which linear codes are algebraic-geometric?”, IEEE Trans. Information Theory, Vol. 37, 1991, pp. 583-602.
-
(1991)
IEEE Trans. Information Theory
, vol.37
, pp. 583-602
-
-
Pellikaan, R.1
Shen, B.Z.2
van Wee, G.J.M.3
-
15
-
-
51249165981
-
Kanonische Codes auf einigen Uberdeckungskurven
-
B.H. Matzat, “Kanonische Codes auf einigen Uberdeckungskurven”, Manuscripta Mathematica, Vol. 77, 1992, pp. 321-335.
-
(1992)
Manuscripta Mathematica
, vol.77
, pp. 321-335
-
-
Matzat, B.H.1
-
17
-
-
85028761790
-
Capacities: From information theory to extremal set theory
-
to appear
-
L. Gargano, J. Körner, U. Vaccaro, “Capacities: from information theory to extremal set theory”, to appear in Journal of the AMS.
-
Journal of the AMS
-
-
Gargano, L.1
Körner, J.2
Vaccaro, U.3
-
18
-
-
0002045459
-
Group Codes on Certain algebraic curves with many rational points
-
J.P. Hansen, H. Stichtenoth, “Group Codes on Certain algebraic curves with many rational points”, AAECC, Vol. 1, 1990, pp. 67-77.
-
(1990)
AAECC
, vol.1
, pp. 67-77
-
-
Hansen, J.P.1
Stichtenoth, H.2
-
19
-
-
0042224372
-
Consecutive Weierstrass gaps and minimum distance of Goppa codes
-
A. Garcia, S.J. Kim, R.F. Lax, “Consecutive Weierstrass gaps and minimum distance of Goppa codes”, Journal of Pure and Applied Algebra, Vol. 84, 1993, pp. 199207.
-
(1993)
Journal of Pure and Applied Algebra
, vol.84
, pp. 199207
-
-
Garcia, A.1
Kim, S.J.2
Lax, R.F.3
|