This paper analyzes a generalized secret-key authentication system from a viewpoint of the information-spectrum methods. In the generalized secret-key authentication system, for each n
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Hiroki KOGA, "A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems" in IEICE TRANSACTIONS on Fundamentals,
vol. E83-A, no. 10, pp. 1983-1986, October 2000, doi: .
Abstract: This paper analyzes a generalized secret-key authentication system from a viewpoint of the information-spectrum methods. In the generalized secret-key authentication system, for each n
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e83-a_10_1983/_p
Copy
@ARTICLE{e83-a_10_1983,
author={Hiroki KOGA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems},
year={2000},
volume={E83-A},
number={10},
pages={1983-1986},
abstract={This paper analyzes a generalized secret-key authentication system from a viewpoint of the information-spectrum methods. In the generalized secret-key authentication system, for each n
keywords={},
doi={},
ISSN={},
month={October},}
Copy
TY - JOUR
TI - A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1983
EP - 1986
AU - Hiroki KOGA
PY - 2000
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E83-A
IS - 10
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - October 2000
AB - This paper analyzes a generalized secret-key authentication system from a viewpoint of the information-spectrum methods. In the generalized secret-key authentication system, for each n
ER -