AEC: A Practical Scheme for Authentication with Error Correction
暂无分享,去创建一个
[1] Dipanwita Roy Chowdhury,et al. An Integrated ECC-MAC Based on RS Code , 2009, Trans. Comput. Sci..
[2] Dipanwita Roy Chowdhury,et al. Nmix: An Ideal Candidate for Key Mixing , 2009, SECRYPT.
[3] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[4] C. D. Martinez,et al. Random number generators using Cellular Automata implemented on FPGAs , 2012, Proceedings of the 2012 44th Southeastern Symposium on System Theory (SSST).
[5] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[6] Solomon W. Golomb,et al. Shift Register Sequences , 1981 .
[7] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[8] Yu Liu,et al. The CRC-NTMAC for noisy message authentication , 2006, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[9] Y. Liu,et al. The BCH-NTMAC for Noisy Message Authentication , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[10] Jon C. Muzio,et al. Synthesis of one-dimensional linear hybrid cellular automata , 1996, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..
[11] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[12] Michael O. Rabin,et al. Probabilistic Algorithms in Finite Fields , 1980, SIAM J. Comput..
[13] Maurice Mignotte,et al. Mathematics for computer algebra , 1991 .
[14] Charles G. Boncelet. The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.
[15] Santanu Chattopadhyay,et al. Additive cellular automata : theory and applications , 1997 .