The Practice of Authentication
From MaRDI portal
Publication:3727858
DOI10.1007/3-540-39805-8_31zbMath0595.94006OpenAlexW1574670797MaRDI QIDQ3727858
Publication date: 1986
Published in: Advances in Cryptology — EUROCRYPT’ 85 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-39805-8_31
cryptographyentropiesauthentication securityconcatenated impersonation/substitution gamerectangular game
Applications of game theory (91A80) Cryptography (94A60) Measures of information, entropy (94A17) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
The combinatorics of authentication and secrecy codes ⋮ A lower bound on authentication after having observed a sequence of messages
This page was built for publication: The Practice of Authentication