CryptoDB
On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2
| Authors: | |
|---|---|
| Download: | 
 | 
| Conference: | EUROCRYPT 1990 | 
BibTeX
@inproceedings{eurocrypt-1990-2829,
  title={On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2},
  booktitle={Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={473},
  pages={306-312},
  doi={10.1007/3-540-46877-3_27},
  author={Ben J. M. Smeets and Peter Vanroose and Zhe-xian Wan},
  year=1990
}
