Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. R. Blom, An optimal class of symmetric key generation systems, Lecture Notes in Computer Science, 209(1985), 335–338 (Advances in Cryptology-Eurocrypt '84)
2. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, Perfectly secure key distribution for dynamic conferences, Lecture Notes in Computer Science, 740(1993), 471–486 (Advances in Cryptology — CRYPTO'92).
3. B. den Boer, A simple and key-economical unconditional authentication scheme, Journal of Computer Security 2(1993), 65–71.
4. Y. Desmedt and Y. Frankel, Shared generation of authenticators and signatures, Adv. in Cryptology — Crypto '91, Lecture Notes in Comput. Sci., 576, 457–469.
5. Y. Desmedt, Y. Frankle and M. Yung, Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback, IEEE Infocom'92, (1992) 2045–2054.
Cited by
49 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Broadcast Authentication from an Information Theoretic Perspective;Encyclopedia of Cryptography, Security and Privacy;2024
2. A Survey of Cover-Free Families: Constructions, Applications, and Generalizations;Fields Institute Communications;2023-11-16
3. Multi-Designated Receiver Authentication Codes: Models and Constructions;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2023-03-01
4. Star-Specific Key-Homomorphic PRFs From Learning With Linear Regression;IEEE Access;2023
5. Hopper;Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security;2022-05-30