Citation: | LIU Shengli, TILBORG Henk van, WENG Jian, et al., “Authentication Codes from ε-ASU Hash Functions with Partially Secret Keys,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 790-793, 2014, |
G.J. Simmons, Authentication theory/coding theory, G.R. Blakley and D. Chaum, eds., Advances in Cryptology, Proc. Crypto'84, New York, Vol.196, pp.411-431, 1985.
|
G.J. Simmons, A game theory model of digital message authentication, Congr. Numer., Vol.34, pp.413-424, 1992.
|
J.L. Carter and M.N. Wegman, Universal classes of hash functions, Journal of Computer and System Sciences, Vol.18, No.2, pp.143-154, 1979.
|
M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, Vol.22, No.3, pp.265-279, 1981.
|
D.R. Stinson, Combinatorial techniques for universal hashing, Journal of Computer and System Sciences, Vol.48, No.2, pp.337-346, 1994.
|
D.R. Stinson, Universal hashing and authentication codes, Designs, Codes and Cryptography, Vol.4, No.4, pp.369-380, 1994.
|
B. den Boer, A simple and key-economical unconditional authentication scheme, Journal of Computer Security, Vol.2, No.1, pp.65-71, 1993.
|
D.R. Stinson, Universal hashing and auhtentication codes, Advances in Cryptology-CRYPTO'91, Vol.576, pp.74-85, 1992.
|
S. Wolf, Information-theoretically and Computationally Secure Key Agreement in Cryptography, ETH Dissertation, No.13138, ETH Zurich, 1999.
|
C.H. Bennett, G. Brassard, C. Crépeau, et al., Generalized privacy amplification, IEEE Trans. Inform. Theory, Vol.41, No.6, pp.1915-1923, 1995.
|
Y. Dodis, R. Ostrovsky, L. Reyzin, et al., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, SIAM Journal on Computing, Vol.38, No.1, pp.97-139, 2008.
|