On message authentication with a correlated setup
From MaRDI portal
Publication:903369
DOI10.1016/j.ipl.2015.11.006zbMath1350.94041OpenAlexW2100557054MaRDI QIDQ903369
Publication date: 5 January 2016
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2015.11.006
Cites Work
- Information-theoretic bounds for authentication schemes
- New hash functions and their use in authentication and set equality
- A lower bound on authentication after having observed a sequence of messages
- Information-theoretic bounds for authentication codes and block designs
- Information Theoretic Bounds on Authentication Systems in Query Model
- Codes Which Detect Deception
- Authentication theory and hypothesis testing
- Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result
- Elements of Information Theory
- Information Theory