Constructions of authentication codes from algebraic curves over finite fields
暂无分享,去创建一个
[1] Henning Stichtenoth,et al. Algebraic function fields and codes , 1993, Universitext.
[2] Douglas R. Stinson,et al. Combinatorial Characterizations of Authentication Codes II , 1992, Des. Codes Cryptogr..
[3] Thomas Johansson,et al. On the cardinality of systematic authentication codes via error-correcting codes , 1996, IEEE Trans. Inf. Theory.
[4] Thomas Johansson,et al. Contributions to unconditionally secure authentication , 1994 .
[5] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[6] H. Stichtenoth,et al. On the Asymptotic Behaviour of Some Towers of Function Fields over Finite Fields , 1996 .
[7] Douglas R. Stinson,et al. On the Connections Between Universal Hashing, Combinatorial Designs and Error-Correcting Codes , 1995, Electron. Colloquium Comput. Complex..
[8] Thomas Johansson,et al. On Families of Hash Functions via Geometric Codes and Concatenation , 1993, CRYPTO.
[9] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[10] W. Waterhouse,et al. Abelian varieties over finite fields , 1969 .
[11] S. Hansen. Rational Points on Curves over Finite Fields , 1995 .
[12] Jürgen Bierbrauer,et al. Universal Hashing and Geometric Codes , 1997, Des. Codes Cryptogr..
[13] Tor Helleseth,et al. Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings , 1996, CRYPTO.
[14] S. G. Vladut,et al. Algebraic-Geometric Codes , 1991 .
[15] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[16] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[17] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[18] F. MacWilliams,et al. Codes which detect deception , 1974 .