@article{DM_2009_21_4_a11,
author = {A. Yu. Zubov},
title = {On the choice of the defence strategy for an authentication code with two-state source},
journal = {Diskretnaya Matematika},
pages = {135--147},
year = {2009},
volume = {21},
number = {4},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/}
}
A. Yu. Zubov. On the choice of the defence strategy for an authentication code with two-state source. Diskretnaya Matematika, Tome 21 (2009) no. 4, pp. 135-147. http://geodesic.mathdoc.fr/item/DM_2009_21_4_a11/
[1] Zubov A. Yu., Matematika kodov autentifikatsii, Gelios ARV, Moskva, 2007
[2] Zubov A. Yu., “K teoretiko-igrovomu podkhodu issledovaniya kodov autentifikatsii”, Diskretnaya matematika, 21:3 (2009), 45–72
[3] Simmons G. J., “A game theoretical model of digital message authentication”, Congressus Numerantium, 34 (1982), 413–424 | MR | Zbl
[4] Simmons G. J., “Authentication theory/Coding theory”, Lect. Notes Comput. Sci., 196, 1985, 411–432
[5] Simmons G. Dzh., “Obzor metodov autentifikatsii informatsii”, TIIER, 76:5 (1988), 105–125
[6] Simmons G. J., “A survey of information authentication”, Contemporary Cryptology: The Science of Information Integrity, ed. Simmons G. J., IEEE Press, New York, 1992, 379–419 | MR