On the choice of the defence strategy for an authentication code with two-state source
Diskretnaya Matematika, Tome 21 (2009) no. 4, pp. 135-147
Voir la notice de l'article provenant de la source Math-Net.Ru
We calculate the exact values of the probabilities of the active attacks for an authentication code with two states of a source.
@article{DM_2009_21_4_a11,
author = {A. Yu. Zubov},
title = {On the choice of the defence strategy for an authentication code with two-state source},
journal = {Diskretnaya Matematika},
pages = {135--147},
publisher = {mathdoc},
volume = {21},
number = {4},
year = {2009},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/}
}
A. Yu. Zubov. On the choice of the defence strategy for an authentication code with two-state source. Diskretnaya Matematika, Tome 21 (2009) no. 4, pp. 135-147. http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/