{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:19:54Z","timestamp":1725488394137},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540577669"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48329-2_30","type":"book-chapter","created":{"date-parts":[[2007,8,6]],"date-time":"2007-08-06T01:25:55Z","timestamp":1186363555000},"page":"355-367","source":"Crossref","is-referenced-by-count":22,"title":["Codes for Interactive Authentication"],"prefix":"10.1007","author":[{"given":"Pete","family":"Gemmell","sequence":"first","affiliation":[]},{"given":"Moni","family":"Naor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"N. Alon, J. Bruck, J. Naor, M. Naor, R. Roth, Construction of Asymptotically Good Low-Rate Error-Correcting Codes through Pseudo-Random Graphs, IEEE Transactions on Information Theory, Vol. 38, No. 2, March 1992","DOI":"10.1109\/18.119713"},{"key":"30_CR2","unstructured":"M. Blum, W. Evans, P. Gemmell, S. Kannan, M. Naor Checking the Correctness of Memories, Proc. 31st Symp. on Foundations of Computer Science, October 1990."},{"key":"30_CR3","first-page":"141","volume":"43","author":"E. F. Brickell","year":"1984","unstructured":"E. F. Brickell. A Few Results in Message Authentication Congressus Numerantium 43 (1984), 141\u2013154.","journal-title":"Congressus Numerantium"},{"key":"30_CR4","doi-asserted-by":"crossref","unstructured":"E. Gilbert, F. J. MacWilliams, N. Sloane, Codes Which Detect Deception, The Bell System Technical Journal, Vol. 53, No. 3, March 1974","DOI":"10.1002\/j.1538-7305.1974.tb02751.x"},{"issue":"1","key":"30_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/18.50374","volume":"36","author":"M. Jimbo","year":"1990","unstructured":"M. Jimbo, R. Fuji-hara. Optimal Authentication Systems and Combinatorial Designs, IEEE Transactions on Information Theory, vol. 36, no 1, January 1990, pp 54\u201362.","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR6","volume-title":"The Theory of Error Correcting Codes","author":"F. J. MacWilliams","year":"1977","unstructured":"F. J. MacWilliams, N. Sloane. The Theory of Error Correcting Codes, North Holland, Amsterdam, 1977."},{"key":"30_CR7","unstructured":"R. Roth. Personal Communication"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"G. Simmons, A Survey of Information Authentication, Proceedings of the IEEE, Vol. 76, No. 5, May 1988","DOI":"10.1109\/5.4445"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"D. Stinson. Universal Hashing and Authentication Codes. Advances in Cryptology: CRYPTO\u2019 91, pp 74\u201385.","DOI":"10.1007\/3-540-46766-1_5"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"D. Stinson. Combinatorial Characterizations of Authentication Codes. Advances in Cryptology: CRYPTO\u2019 91, pp 62\u201373.","DOI":"10.1007\/3-540-46766-1_4"},{"issue":"1","key":"30_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D. Stinson","year":"1990","unstructured":"D. Stinson. The Combinatorics of Authentication and Secrecy Codes. Journal of Cryptology, 1990, vol.2, (no.1):23\u201349.","journal-title":"Journal of Cryptology"},{"key":"30_CR12","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","volume":"1","author":"D. Stinson","year":"1988","unstructured":"D. Stinson. Some Constructions and Bounds for Authentication Codes. Journal of Cryptology, 1988, vol.1, 37\u201351.","journal-title":"Journal of Cryptology"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF02351720","volume":"1","author":"D. Stinson","year":"1988","unstructured":"D. Stinson. A Construction of Authentication\/Secrecy Codes from Certain Combinatorial Designs Journal of Cryptology, 1988, vol.1, (no.2):119\u2013127.","journal-title":"Journal of Cryptology"},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"Wegman","year":"1981","unstructured":"Wegman and Carter, New Hash functions and their use in authentication and set equality J. Computer and System Sci. 22, 1981, pp. 265\u2013279.","journal-title":"J. Computer and System Sci."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 93"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48329-2_30.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:38Z","timestamp":1605647738000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48329-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540577669"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-48329-2_30","relation":{},"subject":[]}}