Gilbert E N, MacWilliams F J, and Stoane N J A.Codes whichdetect deception. The Bell System Technical Journal, 1974,53(3): 405-424.[2]Simmons G J. Authentication theory/coding theory.Advances in Cryptology.[J].In: Proc.-Cryto84, Berlin, Springer-Verlag.1984,:-[3]王新梅, 马文平, 武传坤. 纠错密码理论. 北京: 人民邮电出版社, 2001: 246-255.Wang Xin-mei, Ma Wen-ping, and Wu Chuan-kun. Theoryof Cryptology Based on Error-Correcting Codes. Beijing,Posts Telecom Press, 2001: 246-255.[4]北京大学数学力学系概率统计组编. 正交设计法. 北京: 化学工业出版社, 1979: 69-82.Probability and Statistics group of Math and Mechanics ofBeijing Univ.. Orthogonal Design. Beijng: Chemical IndustryPress, 1979: 69-82.[5]马文平, 王新梅. 关于CARTESIAN认证码的构造. 电子学报,1999, 27(5), 33-35.Ma Wen-ping, Wang Xin-mei. On the construction ofCARTESIAN authentication codes. Acta Electronica Sinica,1999, 27(5): 33-35.[6]Brickell E F.[J].and Stinson D R. Authentication codes withmultiple arbiters. Advances in Cryptology, In: Proc.Eurocrypt88, Berlin, Springer-Verlag.1988,:-
|