{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T23:18:33Z","timestamp":1768346313755,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540583332","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48658-5_16","type":"book-chapter","created":{"date-parts":[[2007,8,9]],"date-time":"2007-08-09T20:50:39Z","timestamp":1186692639000},"page":"140-149","source":"Crossref","is-referenced-by-count":16,"title":["New Bound on Authentication Code with Arbitration"],"prefix":"10.1007","author":[{"given":"Kaoru","family":"Kurosawa","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1002\/j.1538-7305.1974.tb02751.x","volume":"53","author":"E.N. Gilbert","year":"1974","unstructured":"E.N. Gilbert, F.J. MacWilliams and N.J.A. Sloane, \u201cCodes which detect deception\u201d, Bell Syst. Tech. J., Vol.53, 1974, pp.405\u2013424","journal-title":"Bell Syst. Tech. J."},{"key":"16_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/3-540-39568-7_32","volume-title":"Advances in Cryptology, Proceedings of CRYPTO 84","author":"G.J. Simmons","year":"1985","unstructured":"G.J. Simmons, \u201cAuthentication theory\/coding theory\u201d, in Advances in Cryptology, Proceedings of CRYPTO 84, G.R. Blakley and D. Chaum, Eds. Lecture notes in Computer Science, No.196. New York, NY: Springer, 1985, pp.411\u2013431."},{"key":"16_CR3","unstructured":"J.L. Massey, \u201cContemporary Cryptology, An Introduction\u201d, in Contemporary Cryptology, The Science of Information Integrity, G.J. Simmons, Ed., IEEE Press, 1991, pp.3\u201339."},{"key":"16_CR4","volume-title":"Contemporary Cryptology, The science of information integrity","author":"G.J. Simmons","year":"1992","unstructured":"G.J. Simmons, \u201cA survey of Information Authentication\u201d, in Contemporary Cryptology, The science of information integrity, ed. G.J. Simmons, IEEE Press, New York, 1992."},{"key":"16_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/3-540-46766-1_4","volume-title":"Proceedings Crypto 91","author":"D.R. Stinson","year":"1992","unstructured":"D.R. Stinson, Combinatorial Characterization of Authentication Codes, Proceedings Crypto 91, Lecture Notes in Computer Science 576, Springer 1992, pp 62\u201372."},{"key":"16_CR6","unstructured":"G.J. Simmons, \u201cMessage authentication with arbitration of transmitter\/receiver disputes\u201d, in Proceedings of Eurocrypt\u2019 87."},{"issue":"2","key":"16_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BF00204449","volume":"2","author":"G.J. Simmons","year":"1990","unstructured":"G.J. Simmons, \u201cA Cartesian Product Construction for Unconditionally Secure Authentication Codes that Permit Arbitration\u201d, in Journal of Cryptology, Vol.2, no.2, 1990, pp.77\u2013104.","journal-title":"Journal of Cryptology"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Thomas Johansson, \u201cLower Bounds on the Probability of Deception in Authentication with Arbitation\u201d, in Proceedings of 1993 IEEE International Symposium on Information Theory, San Antonio, USA, January 17\u201322, 1993, p.231","DOI":"10.1109\/ISIT.1993.748545"},{"key":"16_CR9","unstructured":"Thomas Johansson, \u201cOn the construction of perfect authentication codes that permit arbitration\u201d, Crypto 93"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D.R. Stinson","year":"1990","unstructured":"D.R. Stinson, \u201cThe combinatorics of authentication and secrecy codes\u201d, Journal of Cryptology, Vol.2, 1990, pp.23\u201349.","journal-title":"Journal of Cryptology"},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"M.N. Wegman","year":"1981","unstructured":"M.N. Wegman and J.L. Carter. New hash functions and their use in authentication and set equality, J. Comput. System Sci. 22(1981), 265\u2013279.","journal-title":"J. Comput. System Sci."},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"D.R. Stinson, \u201cUniversal Hashing and authentication codes\u201d Proceeding of Crypto 91, Santa, Barbara, USA, 1991, pp.74\u201385","DOI":"10.1007\/3-540-46766-1_5"},{"key":"16_CR13","unstructured":"J\u00fcrgen Bierbrauter, Thomas Johanssen, Gregory Kabatianskii, Ben Smeets, \u201cOn Families of Hash Functions via Geometic Codes Concatination\u201d, Crypto 93"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201994"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48658-5_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T07:02:47Z","timestamp":1737356567000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48658-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540583332"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-48658-5_16","relation":{},"subject":[]}}