On message authentication with a correlated setup
From MaRDI portal
Publication:903369
DOI10.1016/J.IPL.2015.11.006zbMATH Open1350.94041OpenAlexW2100557054MaRDI QIDQ903369FDOQ903369
Authors: Shaoquan Jiang
Publication date: 5 January 2016
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2015.11.006
Recommendations
Cites Work
- Elements of Information Theory
- New hash functions and their use in authentication and set equality
- Codes Which Detect Deception
- Information theory. Coding theorems for discrete memoryless systems
- Information-theoretic bounds for authentication codes and block designs
- A lower bound on authentication after having observed a sequence of messages
- Authentication theory and hypothesis testing
- Information Theoretic Bounds on Authentication Systems in Query Model
- Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result
- Information-theoretic bounds for authentication schemes
Cited In (2)
This page was built for publication: On message authentication with a correlated setup
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q903369)