Login / Signup

On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2.

Ben J. M. SmeetsPeter VanrooseZhe-xian Wan
Published in: EUROCRYPT (1990)
Keyphrases
  • wireless networks
  • error correction
  • security issues
  • security analysis