{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:28Z","timestamp":1772893048605,"version":"3.50.1"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/itw.2017.8278016","type":"proceedings-article","created":{"date-parts":[[2018,2,7]],"date-time":"2018-02-07T20:45:14Z","timestamp":1518036314000},"page":"259-263","source":"Crossref","is-referenced-by-count":6,"title":["Tighter bounds on entropy of secret keys in authentication codes"],"prefix":"10.1109","author":[{"given":"Junji","family":"Shikata","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191354"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2317312"},{"key":"ref12","first-page":"547","article-title":"On measures of information and entropy","author":"renyi","year":"1961","journal-title":"Proc of the 4th Berkeley Symposium on Mathematics Statistics and Probability 1960"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/BF00198462"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2769"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_29"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_32"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF01388651"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536496"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181962"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/18.333869"},{"key":"ref5","first-page":"405","volume":"53","author":"gilbert","year":"1974","journal-title":"Codes which detect deception"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.485725"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1998.2767"},{"key":"ref2","author":"dodis","year":"2013","journal-title":"Lecture on &#x201C;optimality of one-time MACs and Shannon impossibility"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(79)90044-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/18.850674"}],"event":{"name":"2017 IEEE Information Theory Workshop (ITW)","location":"Kaohsiung","start":{"date-parts":[[2017,11,6]]},"end":{"date-parts":[[2017,11,10]]}},"container-title":["2017 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8266764\/8277915\/08278016.pdf?arnumber=8278016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,7]],"date-time":"2018-03-07T08:02:49Z","timestamp":1520409769000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8278016\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/itw.2017.8278016","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}