The CRC–NTMAC for Noisy Message Authentication
暂无分享,去创建一个
Yu Liu | C. Boncelet | C. Boncelet | Yu Liu
[1] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[2] William Stallings. Computer Networking with Internet Protocols and Technology , 2003 .
[3] Frank E. Grubbs,et al. An Introduction to Probability Theory and Its Applications , 1951 .
[4] Peter Sweeney. Error Control Coding , 1991 .
[5] Oliver Pretzel. Error-Correcting Codes and Finite Fields , 1992 .
[6] W. W. Peterson,et al. Error-Correcting Codes. , 1962 .
[7] Cheryl Madson,et al. The Use of HMAC-SHA-1-96 within ESP and AH , 1998, RFC.
[8] Shu Lin,et al. Error control coding : fundamentals and applications , 1983 .
[9] Dengguo Feng,et al. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..
[10] W. W. Peterson,et al. Cyclic Codes for Error Detection , 1961, Proceedings of the IRE.
[11] H. Feistel. Cryptography and Computer Privacy , 1973 .
[12] Martin Herrmann,et al. Optimization of cyclic redundancy-check codes with 24 and 32 parity bits , 1993, IEEE Trans. Commun..
[13] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[14] Terry Ritter. The great CRC mystery , 1986 .
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Giovanni Di Crescenzo,et al. Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.
[17] Charles G. Boncelet. The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.