1. E. F. Brickell, “A Few Results in Message Authentication,” Proceedings of the 15th Southeastern Conference on Combinatorics, Graph Theory and Computing, Baton Rouge, LA, March 5–8, 1984, Congressus Numerantium, Vol. 43, Dec. 1984, pp. 141–154.
2. G. J. Simmons, “A Game Theory Model of Digital Message Authentication,” Proceedings of the 11th Annual Conference on Numerical Mathematics and Computing, Univ. of Manitoba, Winnipeg, Canada, Oct. 1–3, 1981, Congressus Numerantium, Vol. 34, June 1982, pp. 413–424.
3. G. J. Simmons, “Message Authentication: A Game on Hypergraphs,” Proceedings of the 15th Southeastern Conference on Combinatorics, Graph Theory and Computing, Baton Rouge, LA, Mar. 5–8, 1984, Congressus Numerantium, Vol. 45, December 1984, pp. 161–192.
4. G. J. Simmons, “Authentication Theory/Coding Theory,” Proceedings of Crypto’84, Santa Barbara, CA. August 19–22, 1984, in Advances in Cryptology, Ed. by R. Blakley, Springer-Verlag, Berlin (1984), pp. 411–431.
5. D. R. Stinson, “Some Constructions and Bounds for Authentication Codes,” presented at Crypto’86, Santa Barbara, CA, Aug. 12–15, 1986, to appear in Journal of Cryptology, 1988.