Authentication codes that are r-fold secure against spoofing
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Combinatorial Characterizations of Authentication Codes II
Designs, Codes and Cryptography
Combinatorial Classification of Optimal AuthenticationCodes with Arbitration
Designs, Codes and Cryptography
Bounds and Combinatorial Structure of (k,n)Multi-Receiver A-Codes
Designs, Codes and Cryptography
New Combinatorial Bounds for Authentication Codes and KeyPredistribution Schemes
Designs, Codes and Cryptography
Combinatorial Bounds on Authentication Codes with Arbitration
Designs, Codes and Cryptography
Universal Hashing and Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Cartesian authentication codes from functions with optimal nonlinearity
Theoretical Computer Science
Logarithm Cartesian authentication codes
Information and Computation
A coding theory construction of new systematic authentication codes
Theoretical Computer Science - Insightful theory
Combinatorial characterizations of authentication codes in verification oracle model
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Combinatorial design of key distribution mechanisms for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Authentication codes and bipartite graphs
European Journal of Combinatorics
Combinatorial Designs for Authentication and Secrecy Codes
Foundations and Trends in Communications and Information Theory
Combinatorial bounds and characterizations of splitting authentication codes
Cryptography and Communications
Hi-index | 0.00 |