Authentication, From an Information Theoretic Perspective
暂无分享,去创建一个
[1] S. Hansen. Rational Points on Curves over Finite Fields , 1995 .
[2] Henk C. A. van Tilborg. Authentication Codes: an Area where Coding and Cryptology Meet , 1995, IMACC.
[3] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[4] Serge G. Vladut,et al. A Note on Authentication Codes from Algebraic Geometry , 1998, IEEE Trans. Inf. Theory.
[5] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[6] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[7] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[8] F. MacWilliams,et al. Codes which detect deception , 1974 .
[9] Thomas Johansson,et al. On the cardinality of systematic authentication codes via error-correcting codes , 1996, IEEE Trans. Inf. Theory.