Efficient hardware implementation of the DES
Proceedings of CRYPTO 84 on Advances in cryptology
Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography, a Primer
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with
CRYPTO '85 Advances in Cryptology
Message Authentication with Manipulation Detection Code
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
The Vernam scheme protects the privacy unconditionally, but is completely insecure to protect the authenticity of a message. Schemes will be discussed in this paper that protect the authenticity unconditionally. The definition of unconditional security is defined. Stream cipher authentication schemes are proposed. The consequences on information protection using RSA and DES are discussed.