Multiround Unconditionally Secure Authentication
暂无分享,去创建一个
[1] Rolf Johannesson,et al. Strengthening Simmons' bound on impersonation , 1991, IEEE Trans. Inf. Theory.
[2] Christian Gehrmann,et al. Secure Multiround Authentication Protocols , 1995, EUROCRYPT.
[3] Thomas Johansson,et al. On Families of Hash Functions via Geometric Codes and Concatenation , 1993, CRYPTO.
[4] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[5] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[6] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[7] L. Tombak,et al. Authentication codes in plaintext and chosen-content attacks , 1996 .
[8] Thomas Johansson,et al. On the cardinality of systematic authentication codes via error-correcting codes , 1996, IEEE Trans. Inf. Theory.
[9] Thomas Johansson,et al. Contributions to unconditionally secure authentication , 1994 .
[10] Moni Naor,et al. Codes for Interactive Authentication , 1994, CRYPTO.
[11] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[12] T. Johansson,et al. e Cardinality of Systematic Au odes Via Error-Correcting , 1996 .
[13] Tor Helleseth,et al. Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.
[14] Christian Gehrmann,et al. Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol , 1994, CRYPTO.
[15] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[16] Christian Gehrmann,et al. Fast Message Authentication Using Efficient Polynomial Evaluation , 1997, FSE.
[17] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[18] Phillip Rogaway. Bucket Hashing and its Application to Fast Message Authentication , 1995, CRYPTO.
[19] Thomas Johansson,et al. On the Relation between A-Codes and Codes Correcting Independent Errors , 1994, EUROCRYPT.
[20] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[21] Mustafa Atici,et al. Universal Hashing and Multiple Authentication , 1996, CRYPTO.
[22] F. MacWilliams,et al. Codes which detect deception , 1974 .