Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference19 articles.
1. E. F. Brickell and D. R. Stinson, Authentication codes with multiple arbiters,Proceedings of Eurocrypt'88, Davos, Switzerland, 1988, LNCS 330, Springer-Verlag, Berlin, pp. 51?55.
2. Y. Desmedt and M. Yung, Asymmetric and securely-arbitrated unconditional authentication systems, submitted. A part of this paper appears as Arbitrated unconditionally secure authentication can be unconditionally protected against arbiter's attack,Proceedings of Crypto'90, Santa Barbara, USA, 1990, LNCS 537, Springer-Verlag, Berlin, pp. 177?188.
3. E. M. Gabidulin, private communication, Feb. 1994.
4. E. M. Gabidulin, Theory of codes with maximum rank distance,Problems of Information Transmission, Vol. 21, No. 1 (1985) pp. 1?12. Russian original, January?March, 1985.
5. E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane, Codes which detect deception,Bell Syst. Tech. J., Vol. 53 (1974) pp. 405?424.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Authentication Codes;Algebraic Curves in Cryptography;2013-06-13
2. MRD Hashing;Designs, Codes and Cryptography;2005-11
3. New Constructions of Constant-Weight Codes;Coding, Cryptography and Combinatorics;2004
4. Combinatorial bounds on authentication codes with arbitration;Designs, Codes and Cryptography;2001
5. Linear Authentication Codes: Bounds and Constructions;Lecture Notes in Computer Science;2001