Codes for Interactive Authentication (1998)

Cached

Download Links

by Pete Gemmell , Moni Naor
Venue:
Citations:12 - 1 self

Active Bibliography

58 Universal Hashing and Authentication Codes – D. R. Stinson - 1991
25 Applications of Combinatorial Designs to Communications, Cryptography, and Networking – C. J. Colbourn, J. H. Dinitz, D. R. Stinson - 1999
11 Applications of Designs to Cryptography – K. Gopalakrishnan, D.R. Stinson
1 Authentication Codes and Algebraic Curves – Chaoping Xing
Authentication protocols in pervasive computing – Nguyen Hoang Long
10 Combinatorial Bounds of Authentication Codes with Arbitration – Kaoru Kurosawa, Satoshi Obana - 1997
7 Combinatorial Bounds and Design of Broadcast Authentication – Hiroshi Fujii, Wattanawong KACHEN, Kaoru KUROSAWA - 1996
4 New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes – Kaoru Kurosawa, Koji Okada, Hajime Saido, Douglas R. Stinson - 1998
2 R.: MAC precomputation with applications to secure memory – Juan A. Garay, Vladimir Kolesnikov, Rae Mclellan - 2009
8 Tight bounds for unconditional authentication protocols in the manual channel and shared key models – Moni Naor, Gil Segev, Adam Smith - 2006
Logarithm Cartesian authentication codes – T. W. Sze, A S. Chanson, A C. Ding, A T. Helleseth, M. G. Parker - 2003
26 Software performance of universal hash functions – Wim Nevelsteen, Bart Preneel - 1999
20 Alpaca: extensible authorization for distributed services – Chris Lesniewski-laas, Bryan Ford, Jacob Strauss, Robert Morris, M. Frans Kaashoek - 2007
1 Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol – Christian Gehrmann - 1994
21 Square Hash: Fast Message Authentication via Optimized Universal Hash Functions – Mark Etzel, Sarvar Patel, Zulfikar Ramzan - 1999
36 Robust fuzzy extractors and authenticated key agreement from close secrets – Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, Adam Smith - 2006
27 Threshold Traitor Tracing – Moni Naor, Benny Pinkas - 1998
178 Visual Cryptography – Moni Naor , Adi Shamir - 1995
GOB Designs for Authentication Codes . . . – Gennian Ge, et al. - 2006