Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
18
views
12
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
526
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology
On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys
other
Author(s):
Gilles Brassard
Publication date
(Print):
1983
Publisher:
Springer US
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Jaypee Brothers Medical Publishers: Covid-19
Most cited references
12
Record
: found
Abstract
: not found
Article
: not found
New directions in cryptography
W. Diffie
,
Chan Hellman
(1976)
0
comments
Cited
335
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Hiding information and signatures in trapdoor knapsacks
R. Merkle
,
M. Hellman
(1978)
0
comments
Cited
80
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
How to Establish a Private Code on a Public Network, in: “Proc. of 23rd FOCS Symposium
S Goldwasser
(1982)
0
comments
Cited
1
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1983
Pages
: 79-86
DOI:
10.1007/978-1-4757-0602-4_7
SO-VID:
6c48f863-d741-4b7d-9610-1e47048f3462
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 99
Analysis of Certain Aspects of Output Feedback Mode
pp. 51
A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography
pp. 61
Comparison of Two Pseudo-Random Number Generators
pp. 79
On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys
pp. 199
Blind Signatures for Untraceable Payments
pp. 205
A Randomized Protocol for Signing Contracts
pp. 267
Quantum Cryptography, or Unforgeable Subway Tokens
Similar content
526
SiGe epitaxial memory for neuromorphic computing with reproducible high performance based on engineered dislocations
Authors:
Shinhyun Choi
,
Scott Tan
,
Zefan Li
…
Evaluation of root morphology and root canal configuration of premolars in the Turkish individuals using cone beam computed tomography
Authors:
Duygu Goller Bulut
,
Taha Köse
,
Gozde Ozcan
…
Computational Fluid Dynamics to Evaluate the Effectiveness of Inferior Turbinate Reduction Techniques to Improve Nasal Airflow
Authors:
Kai Zhao
,
Thomas S Lee
,
Parul Goyal
…
See all similar
Cited by
10
On Fast and Provably Secure Message Authentication Based on Universal Hashing
Authors:
Victor Shoup
MMH: Software message authentication in the Gbit/second rates
Authors:
Shai Halevi
,
Hugo Krawczyk
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
Authors:
John Black
,
Phillip Rogaway
See all cited by