Author:
Abidin Aysajan,Larsson Jan-Åke
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modeling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference25 articles.
1. Abidin, A.: Weaknesses of Authentication in Quantum Cryptography and Strongly Universal Hash Functions. Linköping Studies in Science and Technology. Licentiate Thesis, Applied Mathematics, The Institute of Technology, Linköping University, (2010)
2. Abidin, A., Larsson, J.Å.: Vulnerability of “A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography”. Int. J. Quantum Inf. 7(5), 1047–1052 (2009)
3. Abidin, A., Larsson, J.Å.: New universal hash functions. In: Lucks, S., Armknecht, F. (eds.) WEWoRC 2011. LNCS, vol. 7242, pp. 99–108. Springer, Berlin (2012)
4. Atici, M., Stinson, D.R.: Universal hashing and multiple authentication. In: Koblitz, N. (ed.) CRYPTO ’96. LNCS, vol. 1109, pp. 16–30 (1996)
5. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. Bangalore, India (1984)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献