281 – 287 of 287
      - show: 10
- |
- sort: year (new to old)
        Close
        
            
    
    Embed this list
<iframe src=""
              width=""
              height=""
              allowtransparency="true"
              frameborder="0">
            </iframe>
        - 1997
- 
                        Mark
        A digital signature scheme based on random error-correcting codes
    (1997) 6th IMA International Conference on Cryptography and Coding, 1997 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1355. p.161-167- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Fast authentication codes based on random polynomial residue classes
    (1997) 1997 IEEE International Symposium on Information Theory, ISIT 1997 In IEEE International Symposium on Information Theory - Proceedings p.175-175- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        Multialphabet coding with separate alphabet description
    (1997) Proceedings of the 1997 International Conference on Compression and Complexity of Sequences p.56-65- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 1994
- 
                        Mark
        On the construction of Cartesian authentication codes over symplectic spaces
    
    - Contribution to journal › Article
 
- 
                        Mark
        Bounds on the probability of deception in multiple authentication
    
    - Contribution to journal › Article
 
- 1991
- 
                        Mark
        A lower bound on the probability of deception in multiple authentication
    (1991) 1991 IEEE International Symposium on Information Theory, ISIT 1991 In IEEE International Symposium on Information Theory - Proceedings p.180-180- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
- 
                        Mark
        On the construction of authentication codes with secrecy and codes withstanding spoofing attacks of order L ≥ 2
    (1991) Conference on the Theory and Application of Cryptology, 1990 In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 473 LNCS. p.306-312- Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
 
