Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference9 articles.
1. Brickell, E.F. 1984. A few results in message authentication. Congressus Numerantium, 43:141?154.
2. De Soete, M. 1988. Some constructions for authentication - secrecy codes. Lecture Notes in Computer Science, 330:57?75.
3. De Soete, M. 1991. New bounds and constructions for authentication/secrecy codes with splitting. Journal of Cryptology, 3:173?186.
4. De Soete, M., Vedder, K., and Walker, M. 1990. Cartesian authentication schemes. Lectures Notes in Computer Science 434:476?490.
5. Massey, J.L. 1986. Cryptography?a selective survey. In Digital Communications, Amsterdam: North-Holland, pages 3?21.
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献