International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2

Authors:
Ben J. M. Smeets
Peter Vanroose
Zhe-xian Wan
Download:
DOI: 10.1007/3-540-46877-3_27 (login may be required)
Search ePrint
Search Google
Conference: EUROCRYPT 1990
BibTeX
@inproceedings{eurocrypt-1990-2829,
  title={On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2},
  booktitle={Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={473},
  pages={306-312},
  doi={10.1007/3-540-46877-3_27},
  author={Ben J. M. Smeets and Peter Vanroose and Zhe-xian Wan},
  year=1990
}