Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions
暂无分享,去创建一个
[1] P. Erdös,et al. Families of finite sets in which no set is covered by the union ofr others , 1985 .
[2] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[3] Mustafa Atici,et al. Universal Hashing and Multiple Authentication , 1996, CRYPTO.
[4] Satoshi Obana,et al. Characterisation of (k, n) Multi-receiver Authentication , 1997, ACISP.
[5] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[6] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[7] Kathleen A. S. Quinn. Some constructions for key distribution patterns , 1994, Des. Codes Cryptogr..
[8] John G. Proakis,et al. Digital Communications , 1983 .
[9] Moti Yung,et al. Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.
[10] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[11] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[12] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[13] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..
[14] Douglas R. Stinson,et al. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption , 1997, Des. Codes Cryptogr..
[15] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[16] Thomas Johansson. Lower bounds on the probability of deception in authentication with arbitration , 1994, IEEE Trans. Inf. Theory.
[17] Ben J. M. Smeets. Bounds on the probability of deception in multiple authentication , 1994, IEEE Trans. Inf. Theory.
[18] Kaoru Kurosawa,et al. Combinatorial Bounds and Design of Broadcast Authentication (Special Section on Discrete Mathematics and Its Applications) , 1996 .
[19] Zoltán Füredi,et al. Families of Finite Sets in Which No Set Is Covered by the Union of Two Others , 1982, J. Comb. Theory, Ser. A.
[20] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[21] J. L. Massey,et al. Cryptography ― a selective survey , 1986 .
[22] Reihaneh Safavi-Naini,et al. New Results on Multi-Receiver Authentication Codes , 1998, EUROCRYPT.