On a Fallacious Bound for Authentication Codes.
Carlo BlundoAlfredo De SantisKaoru KurosawaWakaha OgataPublished in: J. Cryptol. (1999)
Keyphrases
- lower bound
- worst case
- upper bound
- error bounds
- data encryption
- biometric authentication
- data sets
- error correction
- security requirements
- user authentication
- factor authentication
- logical operations
- error correcting codes
- semi fragile watermarking
- database
- identity authentication
- biometric data
- image authentication
- authentication protocol
- optimal solution
- information systems