메뉴 건너뛰기




Volumn 773 LNCS, Issue , 1994, Pages 355-367

Codes for interactive authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 85013455236     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48329-2_30     Document Type: Conference Paper
Times cited : (27)

References (14)
  • 1
    • 0026834814 scopus 로고
    • Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs
    • March
    • N. Alon, J. Brack, J. Naor, M. Naor, R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, Vol. 38, No. 2, March 1992
    • (1992) IEEE Transactions on Information Theory , vol.38 , Issue.2
    • Alon, N.1    Brack, J.2    Naor, J.3    Naor, M.4    Roth, R.5
  • 3
    • 0001078413 scopus 로고
    • A Few Results in Message Authentication
    • E. F. Brickell. A Few Results in Message Authentication Congressus Numerantium 43 (1984), 141-154.
    • (1984) Congressus Numerantium , vol.43 , pp. 141-154
    • Brickell, E.F.1
  • 5
    • 0025207474 scopus 로고
    • Optimal Authentication Systems and Combinatorial De-signs
    • January
    • M. Jimbo, R. Fujihara. Optimal Authentication Systems and Combinatorial De-signs, IEEE Transactions on Information Theory, vol. 36, no 1, January 1990, pp 54-62.
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.1 , pp. 54-62
    • Jimbo, M.1    Fujihara, R.2
  • 7
    • 85028758391 scopus 로고    scopus 로고
    • Personal Communication
    • R. Roth. Personal Communication
    • Roth, R.1
  • 8
    • 0024015453 scopus 로고
    • A Survey of Information Authentication
    • May
    • G. Simmons, A Survey of Information Authentication, Proceedings of the IEEE, Vol. 76, No. 5, May 1988
    • (1988) Proceedings of the IEEE , vol.76 , Issue.5
    • Simmons, G.1
  • 10
    • 84902197959 scopus 로고    scopus 로고
    • Combinatorial Characterizations of Authentication Codes
    • D. Stinson. Combinatorial Characterizations of Authentication Codes. Advances in Cryptology: CRYPTO '91, pp 62-73.
    • Advances in Cryptology: CRYPTO’91 , pp. 62-73
    • Stinson, D.1
  • 11
    • 0025212061 scopus 로고
    • The Combinatorics of Authentication and Secrecy Codes
    • (no.l)
    • D. Stinson. The Combinatorics of Authentication and Secrecy Codes. Journal of Cryptology, 1990, vol.2, (no.l):23-49.
    • (1990) Journal of Cryptology , vol.2 , pp. 23-49
    • Stinson, D.1
  • 12
    • 0023828936 scopus 로고
    • Some Constructions and Bounds for Authentication Codes
    • D. Stinson. Some Constructions and Bounds for Authentication Codes. Journal of Cryptology, 1988, vol.1, 37-51.
    • (1988) Journal of Cryptology , vol.1 , pp. 37-51
    • Stinson, D.1
  • 13
    • 0024144985 scopus 로고
    • A Construction of Authentication/Secrecy Codes from Certain Combinatorial Designs
    • D. Stinson. A Construction of Authentication/Secrecy Codes from Certain Combinatorial Designs Journal of Cryptology, 1988, vol.1, (no.2): 119-127.
    • (1988) Journal of Cryptology , vol.1 , Issue.2 , pp. 119-127
    • Stinson, D.1
  • 14
    • 0019572642 scopus 로고
    • New Hash functions and their use in authentication and set equality
    • Wegman and Carter, New Hash functions and their use in authentication and set equality J. Computer and System Sci. 22, 1981, pp. 265-279.
    • (1981) J. Computer and System Sci , vol.22 , pp. 265-279
    • Wegman1    Carter2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.