Optimal authentication systems
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Authentication codes that are r-fold secure against spoofing
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Combinatorial Characterizations of Authentication Codes II
Designs, Codes and Cryptography
Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Bounds and Characterizations of Authentication/SecrecySchemes
Designs, Codes and Cryptography
Linear Sections of the Finite Veronese Varieties and AuthenticationSystems Defined Using Geometry
Designs, Codes and Cryptography
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Crypto topics and applications I
Algorithms and theory of computation handbook
Bit commitment in the bounded storage model: tight bound and simple optimal construction
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Hi-index | 0.00 |