{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:18:06Z","timestamp":1725488286277},"publisher-location":"New York, NY","reference-count":14,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387971964"},{"type":"electronic","value":"9780387347998"}],"license":[{"start":{"date-parts":[[1990,1,1]],"date-time":"1990-01-01T00:00:00Z","timestamp":631152000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1990]]},"DOI":"10.1007\/0-387-34799-2_24","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:17:36Z","timestamp":1186363056000},"page":"311-317","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Bounds and Constructions for Authentication - Secrecy Codes with Splitting"],"prefix":"10.1007","author":[{"given":"Marijke","family":"De Soete","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,1]]},"reference":[{"key":"24_CR1","unstructured":"Beth T., Jungnickel D., Lenz H., Design Theory. Wissenschaftsverlag Bibliografisches Institut Mannheim, 1985."},{"key":"24_CR2","unstructured":"Brickell E. F., A few results in message authentication. Proc. of the 15th Southeastern Conf. on Combinatorics, Graph theory and Computing, Boca Raton LA (1984), 141\u2013154."},{"key":"24_CR3","unstructured":"De Soete M., Some Constructions for Authentication \/ Secrecy codes, Proceedings of Eurocrypt\u201988, Davos, L.N.C.S., to appear."},{"key":"24_CR4","unstructured":"De Soete M., New Bounds and Constructions for Authentication \/ Secrecy Codes with Splitting. In preparation."},{"key":"24_CR5","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53-3","author":"E. N. Gilbert","year":"1974","unstructured":"Gilbert E. N., MacWilliams F. J., Sloane N. J. A., Codes which detect deception. Bell Sys. Techn. J., Vol.53-3 (1974), 405\u2013424.","journal-title":"Bell Sys. Techn. J."},{"key":"24_CR6","unstructured":"Massey J. L., Cryptography-A Selective Survey. Proc. of 1985 Int. Tirrenia Workshop on Digital Communications, Tirrenia, Italy, 1985, Digital Communications, ed. E. Biglieri and G. Prati, Elsevier Science Publ. 1986, 3\u201325."},{"key":"24_CR7","unstructured":"Payne S. E., Thas J. A., Finite generalized quadrangles. Research Notes in Math. #110, Pitman Publ. Inc. 1984."},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/BF01835977","volume":"14","author":"S. S. Shrikhande","year":"1976","unstructured":"Shrikhande S. S., Affine resolvable balanced incomplete block designs: a survey. Aequat. Math. 14 (1976), 251\u2013269.","journal-title":"Aequat. Math."},{"key":"24_CR9","first-page":"161","volume":"45","author":"G. J. Simmons","year":"1984","unstructured":"Simmons G. J., Message Authentication: A Game on Hypergraphs. Proc. of the 15th Southeastern Conf. on Combinatorics, Graph Theory and Computing, Baton Rouge LA Mar 5\u20138 1984, Cong. Num. 45 (1984), 161\u2013192.","journal-title":"Cong. Num."},{"key":"24_CR10","unstructured":"Simmons G. J., Authentication theory \/ Coding theory. Proc. of Crypto\u201984, Santa Barbara, CA, Aug.19\u201322, 1984, Advances in Cryptology, ed. R. Blakley, Lect. Notes Comp. Science 196, Springer 1985, 411\u2013432."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Simmons G. J., A natural taxonomy for digital information authentication schemes. Proc. of Crypto\u2019 87, Santa Barbara, CA, Aug 16\u201320, 1987, to appear in Advances in Cryptology, ed. C. Pomerance, Springer Verlag, Berlin.","DOI":"10.1007\/3-540-48184-2_25"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C. E. Shannon","year":"1949","unstructured":"Shannon C. E., Communication Theory of Secrecy Systems. Bell Technical Journal, Vol.28 (1949), 656\u2013715.","journal-title":"Bell Technical Journal"},{"key":"24_CR13","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","volume":"1","author":"D. R. Stinson","year":"1988","unstructured":"Stinson D. R., Some Constructions and Bounds for Authentication Codes. J. Cryptology 1 (1988), 37\u201351.","journal-title":"J. Cryptology"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Stinson D. R., A construction for authentication \/ secrecy codes from certain combinatorial designs. Crypto\u2019 87, Santa Barbara, CA, Aug 16\u201320, 1987, to appear in J. Cryptology.","DOI":"10.1007\/3-540-48184-2_31"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 88"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34799-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T16:53:18Z","timestamp":1587833598000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34799-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990]]},"ISBN":["9780387971964","9780387347998"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/0-387-34799-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1990]]},"assertion":[{"value":"1 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}