On "the Power of Verification Queries" in Unconditionally Secure Message Authentication
暂无分享,去创建一个
[1] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[2] F. MacWilliams,et al. Codes which detect deception , 1974 .
[3] John Black,et al. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions , 2000, CRYPTO.
[4] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[5] Ute Rosenbaum. A lower bound on authentication after having observed a sequence of messages , 2004, Journal of Cryptology.
[6] Chanathip Namprempre,et al. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm , 2000, ASIACRYPT.
[7] Douglas R. Stinson,et al. The combinatorics of authentication and secrecy codes , 2005, Journal of Cryptology.
[8] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[9] Dingyi Pei. Information-theoretic bounds for authentication codes and block designs , 2004, Journal of Cryptology.