Applications of combinatorial designs in computer science
ACM Computing Surveys (CSUR)
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
A Natural Taxonomy for Digital Information Authentication Schemes
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Codes for Interactive Authentication
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Three Constructions of Authentication Codes with Perfect Secrecy
Designs, Codes and Cryptography
Three constructions of authentication/secrecy codes
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Combinatorial Designs for Authentication and Secrecy Codes
Foundations and Trends in Communications and Information Theory
A class of authentication codes with secrecy
Designs, Codes and Cryptography
Unconditionally secure chaffing-and-winnowing: a relationship between encryption and authentication
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Hi-index | 0.00 |