-
1
-
-
0026834814
-
Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs
-
March
-
N. Alon, J. Brack, J. Naor, M. Naor, R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, Vol. 38, No. 2, March 1992
-
(1992)
IEEE Transactions on Information Theory
, vol.38
, Issue.2
-
-
Alon, N.1
Brack, J.2
Naor, J.3
Naor, M.4
Roth, R.5
-
2
-
-
0026405370
-
Checking the Correctness of Memories
-
October
-
M. Blum, W. Evans, P. Gemmell, S. Kannan, M. Naor Checking the Correctness of Memories, Pxoc. 31st Symp. on Foundations of Computer Science, October 1990.
-
(1990)
Pxoc. 31st Symp. on Foundations of Computer Science
-
-
Blum, M.1
Evans, W.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
3
-
-
0001078413
-
A Few Results in Message Authentication
-
E. F. Brickell. A Few Results in Message Authentication Congressus Numerantium 43 (1984), 141-154.
-
(1984)
Congressus Numerantium
, vol.43
, pp. 141-154
-
-
Brickell, E.F.1
-
4
-
-
0016038540
-
Codes Which Detect Deception
-
March
-
E. Gilbert, F. J. MacWilliams, N. Sloane, Codes Which Detect Deception, The Bell System Technical Journal, Vol. 53, No. 3, March 1974
-
(1974)
The Bell System Technical Journal
, vol.53
, Issue.3
-
-
Gilbert, E.1
MacWilliams, F.J.2
Sloane, N.3
-
5
-
-
0025207474
-
Optimal Authentication Systems and Combinatorial De-signs
-
January
-
M. Jimbo, R. Fujihara. Optimal Authentication Systems and Combinatorial De-signs, IEEE Transactions on Information Theory, vol. 36, no 1, January 1990, pp 54-62.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 54-62
-
-
Jimbo, M.1
Fujihara, R.2
-
7
-
-
85028758391
-
-
Personal Communication
-
R. Roth. Personal Communication
-
-
-
Roth, R.1
-
8
-
-
0024015453
-
A Survey of Information Authentication
-
May
-
G. Simmons, A Survey of Information Authentication, Proceedings of the IEEE, Vol. 76, No. 5, May 1988
-
(1988)
Proceedings of the IEEE
, vol.76
, Issue.5
-
-
Simmons, G.1
-
10
-
-
84902197959
-
Combinatorial Characterizations of Authentication Codes
-
D. Stinson. Combinatorial Characterizations of Authentication Codes. Advances in Cryptology: CRYPTO '91, pp 62-73.
-
Advances in Cryptology: CRYPTO’91
, pp. 62-73
-
-
Stinson, D.1
-
11
-
-
0025212061
-
The Combinatorics of Authentication and Secrecy Codes
-
(no.l)
-
D. Stinson. The Combinatorics of Authentication and Secrecy Codes. Journal of Cryptology, 1990, vol.2, (no.l):23-49.
-
(1990)
Journal of Cryptology
, vol.2
, pp. 23-49
-
-
Stinson, D.1
-
12
-
-
0023828936
-
Some Constructions and Bounds for Authentication Codes
-
D. Stinson. Some Constructions and Bounds for Authentication Codes. Journal of Cryptology, 1988, vol.1, 37-51.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 37-51
-
-
Stinson, D.1
-
13
-
-
0024144985
-
A Construction of Authentication/Secrecy Codes from Certain Combinatorial Designs
-
D. Stinson. A Construction of Authentication/Secrecy Codes from Certain Combinatorial Designs Journal of Cryptology, 1988, vol.1, (no.2): 119-127.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 119-127
-
-
Stinson, D.1
-
14
-
-
0019572642
-
New Hash functions and their use in authentication and set equality
-
Wegman and Carter, New Hash functions and their use in authentication and set equality J. Computer and System Sci. 22, 1981, pp. 265-279.
-
(1981)
J. Computer and System Sci
, vol.22
, pp. 265-279
-
-
Wegman1
Carter2
|