On message authentication with a correlated setup
From MaRDI portal
Recommendations
Cites work
- A lower bound on authentication after having observed a sequence of messages
- Authentication theory and hypothesis testing
- Codes Which Detect Deception
- Elements of Information Theory
- Information Theoretic Bounds on Authentication Systems in Query Model
- Information theory. Coding theorems for discrete memoryless systems
- Information-theoretic bounds for authentication codes and block designs
- Information-theoretic bounds for authentication schemes
- New hash functions and their use in authentication and set equality
- Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result
Cited in
(2)
This page was built for publication: On message authentication with a correlated setup
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q903369)