Author of the publication

On the cardinality of systematic authentication codes via error-correcting codes.

, , and . IEEE Trans. Inf. Theory, 42 (2): 566-578 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust and security: A new look at the Byzantine generals problem., , and . Network Threats, volume 38 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 75-83. DIMACS/AMS, (1996)A Digital Signature Scheme Based on Random Error-Correcting Codes., , and . IMACC, volume 1355 of Lecture Notes in Computer Science, page 161-167. Springer, (1997)On Families of Hash Functions via Geometric Codes and Concatenation., , , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 331-342. Springer, (1993)On the cardinality of systematic authentication codes via error-correcting codes., , and . IEEE Trans. Inf. Theory, 42 (2): 566-578 (1996)On Plotkin-Elias Type Bounds for Binary Arithmetic Codes., and . Algebraic Coding, volume 781 of Lecture Notes in Computer Science, page 263-269. Springer, (1993)Linear Algebra Approach to Secret Sharing Schemes., and . Error Control, Cryptology, and Speech Compression, volume 829 of Lecture Notes in Computer Science, page 33-40. Springer, (1993)General Perfect Secret Sharing Schemes., and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 367-371. Springer, (1995)On the Relation between A-Codes and Codes Correcting Independent Errors., , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 1-11. Springer, (1993)