Thomas Johansson
161 – 170 of 178
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=""
width=""
height=""
allowtransparency="true"
frameborder="0">
</iframe>
- 1996
-
Mark
Universal hash functions from exponential sums over finite fields and Galois rings
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
On the cardinality of systematic authentication codes via error-correcting codes
- Contribution to journal › Article
-
Mark
Relations between error-correcting codes, authentication
(1996) Computer Security, Cryptology and Coding theory research program, Cambridge
- Contribution to conference › Abstract
- 1995
-
Mark
On A2-codes including arbiter's attacks
(1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Authentication codes for non-trusting parties obtained from rank metric codes
- Contribution to journal › Article
-
Mark
Authentication codes protecting against collusion attacks
- Contribution to conference › Paper, not in proceeding
-
Mark
Constructions of asymmetric authentication systems
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
Lower bounds on the probability of deception in authentication with arbitration
- Contribution to journal › Article
-
Mark
A shift register construction of unconditionally secure authentication codes
- Contribution to journal › Article
-
Mark
Secrecy codes for source messages of finite length
- Contribution to conference › Paper, not in proceeding
