1. Lect Notes Comput Sci;A. Beutelspacher,1988
2. E. F. Brickell, A few results in message authentication, Congressus Numerantium, Vol.43 (1984), 141–154.
3. T. Cover and J. Thomas, Elements of Information Theory, New York; Wiley, 1991.
4. Y. Desmedt, Y. Frankel and M. Yung, Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback, IEEE Infocom’92, (1992) 2045–2054.
5. Lect Notes Comput Sci;A. Fiat,1994