1. Beth, T., Jungnickel, D., Lenz, H.: Design Theory, vols. I and II. Encyclopedia of Math. and Its Applications, vols. 69/78. Cambridge University Press, Cambridge (1999)
2. Blundo, C., De Santis, A., Kurosawa, K., Ogata, W.: On a fallacious bound for authentication codes. J. Cryptol. 12, 155–159 (1999)
3. Brickell, E.F.: A few results in message authentication. Congr. Numer. 43, 141–154 (1984)
4. Colbourn, C.J., Dinitz, J.H. (eds.): Handbook of Combinatorial Designs, 2nd edn. CRC Press, Boca Raton (2006)
5. Lecture Notes in Computer Science;M Soete De,1988