The combinatorics of authentication and secrecy codes
- 1 February 1990
- journal article
- Published by Springer Nature in Journal of Cryptology
- Vol. 2 (1) , 23-49
- https://doi.org/10.1007/bf02252868
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- The Practice of AuthenticationPublished by Springer Nature ,2007
- An introduction to contemporary cryptologyProceedings of the IEEE, 1988
- A survey of information authenticationProceedings of the IEEE, 1988
- Some constructions and bounds for authentication codesJournal of Cryptology, 1988
- Steiner pentagon systemsDiscrete Mathematics, 1984
- A class of three-designsJournal of Combinatorial Theory, Series A, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Codes Which Detect DeceptionBell System Technical Journal, 1974
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949
- über Steinersche SystemeAbhandlungen aus dem Mathematischen Seminar der Universitat Hamburg, 1937