On the Construction of Perfect Authentication Codes that Permit Arbitration
暂无分享,去创建一个
[1] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[2] F. MacWilliams,et al. Codes which detect deception , 1974 .
[3] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[4] Thomas Johansson. Lower bounds on the probability of deception in authentication with arbitration , 1994, IEEE Trans. Inf. Theory.
[5] Douglas R. Stinson,et al. Universal hashing and authentication codes , 1991, Des. Codes Cryptogr..
[6] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[7] Thomas Johansson,et al. On the Relation between A-Codes and Codes Correcting Independent Errors , 1994, EUROCRYPT.
[8] Ernest F. Brickell,et al. Authentication Codes with Multiple Arbiters (Extended Abstract) , 1988, EUROCRYPT.
[9] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[10] Gustavus J. Simmons,et al. Message Authentication with Arbitration of Transmitter/Receiver Disputes , 1987, EUROCRYPT.