Ben Smeets
31 – 40 of 56
- show: 10
- |
- sort: year (new to old)
Close
Embed this list
<iframe src=" "
width=" "
height=" "
allowtransparency="true"
frameborder="0">
</iframe>
- 1997
-
Mark
Fast message authentication using efficient polynomial evaluation
1997) 4th International Workshop on Fast Software Encryption, FSE 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1267. p.190-204(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Fast authentication codes based on random polynomial residue classes
1997) 1997 IEEE International Symposium on Information Theory, ISIT 1997 In IEEE International Symposium on Information Theory - Proceedings p.175-175(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Estimation of escape probabilities for PPM based on universal source coding theory
1997) 1997 IEEE International Symposium on Information Theory, ISIT 1997 In IEEE International Symposium on Information Theory - Proceedings p.65-65(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Multialphabet coding with separate alphabet description
1997) Proceedings of the 1997 International Conference on Compression and Complexity of Sequences p.56-65(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
-
Mark
Towards understanding and improving escape probabilities in PPM
(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1996
-
Mark
On the cardinality of systematic authentication codes via error-correcting codes
(
- Contribution to journal › Article
- 1995
-
Mark
On A2-codes including arbiter's attacks
1995) Workshop on the Theory and Application of Cryptographic Techniques EUROCRYPT'94 950. p.456-461(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
- 1994
-
Mark
On the construction of Cartesian authentication codes over symplectic spaces
(
- Contribution to journal › Article
-
Mark
Bounds on the probability of deception in multiple authentication
(
- Contribution to journal › Article
-
Mark
A coding theoretic approach to attack certain stream ciphers
1994) 1994 IEEE International Symposium on Information Theory, ISIT 1994 In IEEE International Symposium on Information Theory - Proceedings p.367-367(
- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding