{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:23:32Z","timestamp":1753889012681},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_4","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"62-73","source":"Crossref","is-referenced-by-count":18,"title":["Combinatorial characterizations of authentication codes"],"prefix":"10.1007","author":[{"given":"D. R.","family":"Stinson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"J. L. Massey. Cryptography \u2014 a selective survey, in Digital Communications, North-Holland (pub.) (1986), 3\u201321.","DOI":"10.1016\/S0029-6465(22)00409-1"},{"key":"4_CR2","first-page":"161","volume":"45","author":"G. J. Simmons","year":"1984","unstructured":"G. J. Simmons. Message authentication: a game on hypergraphs, Congr. Numer. 45 (1984), 161\u2013192.","journal-title":"Congr. Numer."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume":"196","author":"G. J. Simmons","year":"1985","unstructured":"G. J. Simmons. Authentication theory\/coding theory, Lecture Notes in Comput. Sci. 196 (1985), 411\u2013432 (proceedings of CRYPTO 84).","journal-title":"Lecture Notes in Comput. Sci."},{"key":"4_CR4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","volume":"1","author":"D. R. Stinson","year":"1988","unstructured":"D. R. Stinson. Some constructions and bounds for authentication codes, J. Cryptology 1 (1988), 37\u201351.","journal-title":"J. Cryptology"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D. R. Stinson","year":"1990","unstructured":"D. R. Stinson. The combinatorics of authentication and secrecy codes, J. Cryptology 2 (1990), 23\u201349.","journal-title":"J. Cryptology"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,13]],"date-time":"2023-05-13T19:20:22Z","timestamp":1684005622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_4","relation":{},"subject":[]}}