On the choice of the defence strategy for an authentication code with two-state source
Diskretnaya Matematika, Tome 21 (2009) no. 4, pp. 135-147.

Voir la notice de l'article provenant de la source Math-Net.Ru

We calculate the exact values of the probabilities of the active attacks for an authentication code with two states of a source.
@article{DM_2009_21_4_a11,
     author = {A. Yu. Zubov},
     title = {On the choice of the defence strategy for an authentication code with two-state source},
     journal = {Diskretnaya Matematika},
     pages = {135--147},
     publisher = {mathdoc},
     volume = {21},
     number = {4},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/}
}
TY  - JOUR
AU  - A. Yu. Zubov
TI  - On the choice of the defence strategy for an authentication code with two-state source
JO  - Diskretnaya Matematika
PY  - 2009
SP  - 135
EP  - 147
VL  - 21
IS  - 4
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/
LA  - ru
ID  - DM_2009_21_4_a11
ER  - 
%0 Journal Article
%A A. Yu. Zubov
%T On the choice of the defence strategy for an authentication code with two-state source
%J Diskretnaya Matematika
%D 2009
%P 135-147
%V 21
%N 4
%I mathdoc
%U http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/
%G ru
%F DM_2009_21_4_a11
A. Yu. Zubov. On the choice of the defence strategy for an authentication code with two-state source. Diskretnaya Matematika, Tome 21 (2009) no. 4, pp. 135-147. http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/

[1] Zubov A. Yu., Matematika kodov autentifikatsii, Gelios ARV, Moskva, 2007

[2] Zubov A. Yu., “K teoretiko-igrovomu podkhodu issledovaniya kodov autentifikatsii”, Diskretnaya matematika, 21:3 (2009), 45–72

[3] Simmons G. J., “A game theoretical model of digital message authentication”, Congressus Numerantium, 34 (1982), 413–424 | MR | Zbl

[4] Simmons G. J., “Authentication theory/Coding theory”, Lect. Notes Comput. Sci., 196, 1985, 411–432

[5] Simmons G. Dzh., “Obzor metodov autentifikatsii informatsii”, TIIER, 76:5 (1988), 105–125

[6] Simmons G. J., “A survey of information authentication”, Contemporary Cryptology: The Science of Information Integrity, ed. Simmons G. J., IEEE Press, New York, 1992, 379–419 | MR