Login / Signup
A Lower Bound on Authentication After Having Observed a Sequence of Messages.
Ute Rosenbaum
Published in:
J. Cryptol. (1993)
Keyphrases
</>
lower bound
upper bound
branch and bound
branch and bound algorithm
np hard
email
worst case
optimal solution
lower and upper bounds
image authentication
neural network
pseudorandom
text messages
identity authentication