Authentication theory and hypothesis testing
From MaRDI portal
Recommendations
Cited in
(19)- Unconditionally Secure Approximate Message Authentication
- A lower bound on authentication after having observed a sequence of messages
- An information-theoretic model for steganography
- Anonymity Protocols as Noisy Channels
- Authentication Theory/Coding Theory
- Blind coding: authentication frauds from the point of view of rate-distortion theory
- Bit commitment in the bounded storage model: tight bound and simple optimal construction
- scientific article; zbMATH DE number 3893245 (Why is no real title available?)
- Legal messages for some message authentication functions in block ciphers
- Anonymity protocols as noisy channels
- scientific article; zbMATH DE number 4148026 (Why is no real title available?)
- On the experimental estimation of the lower bound for the maximum number of messages in a scheme aimed at data protection against spoofing
- Message authentication with arbitration of transmitter/receiver disputes
- A unified and generalized treatment of authentication theory
- New Trends in Chaos-Based Communications and Signal Processing
- scientific article; zbMATH DE number 826072 (Why is no real title available?)
- On message authentication with a correlated setup
- Commitment and authentication systems
- Message authentication and dynamic passwords
This page was built for publication: Authentication theory and hypothesis testing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4501743)