CryptoDB
On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2
Authors: | |
---|---|
Download: |
|
Conference: | EUROCRYPT 1990 |
BibTeX
@inproceedings{eurocrypt-1990-2829, title={On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2}, booktitle={Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series={Lecture Notes in Computer Science}, publisher={Springer}, volume={473}, pages={306-312}, doi={10.1007/3-540-46877-3_27}, author={Ben J. M. Smeets and Peter Vanroose and Zhe-xian Wan}, year=1990 }