The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Cet article analyse un système généralisé d'authentification par clé secrète du point de vue des méthodes du spectre d'information. Dans le système généralisé d'authentification par clé secrète, pour chaque n
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Hiroki KOGA, "A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems" in IEICE TRANSACTIONS on Fundamentals,
vol. E83-A, no. 10, pp. 1983-1986, October 2000, doi: .
Abstract: This paper analyzes a generalized secret-key authentication system from a viewpoint of the information-spectrum methods. In the generalized secret-key authentication system, for each n
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e83-a_10_1983/_p
Copier
@ARTICLE{e83-a_10_1983,
author={Hiroki KOGA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems},
year={2000},
volume={E83-A},
number={10},
pages={1983-1986},
abstract={This paper analyzes a generalized secret-key authentication system from a viewpoint of the information-spectrum methods. In the generalized secret-key authentication system, for each n
keywords={},
doi={},
ISSN={},
month={October},}
Copier
TY - JOUR
TI - A Generalization of the Simmons' Bounds on Secret-Key Authentication Systems
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1983
EP - 1986
AU - Hiroki KOGA
PY - 2000
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E83-A
IS - 10
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - October 2000
AB - This paper analyzes a generalized secret-key authentication system from a viewpoint of the information-spectrum methods. In the generalized secret-key authentication system, for each n
ER -