A unified and generalized treatment of authentication theory
- 1 January 1996
- book chapter
- Published by Springer Nature
- p. 387-398
- https://doi.org/10.1007/3-540-60922-9_32
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Authentication Theory/Coding TheoryPublished by Springer Nature ,2000
- Bounds on the probability of deception in multiple authenticationIEEE Transactions on Information Theory, 1994
- Lower bounds on the probability of deception in authentication with arbitrationIEEE Transactions on Information Theory, 1994
- A lower bound on authentication after having observed a sequence of messagesJournal of Cryptology, 1993
- Strengthening Simmons' bound on impersonationIEEE Transactions on Information Theory, 1991
- On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2Published by Springer Nature ,1991
- Repeated use of codes which detect deception (Corresp.)IEEE Transactions on Information Theory, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- Codes Which Detect DeceptionBell System Technical Journal, 1974
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949