1996 | ||
---|---|---|
8 | Reihaneh Safavi-Naini, L. Tombak: Near-perfect protection and key strategies in authentication codes under spoofing attack of order r. Ars Comb. 44: (1996) | |
7 | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-Content Attacks. Des. Codes Cryptography 7(1-2): 83-99 (1996) | |
1994 | ||
6 | EE | L. Tombak, Reihaneh Safavi-Naini: Authentication Codes That Are r-Fold Secure Against Spoofing. ACM Conference on Computer and Communications Security 1994: 166-169 |
5 | Reihaneh Safavi-Naini, L. Tombak: Combinatorial Structure of A-codes with r-fold Security. ASIACRYPT 1994: 211-223 | |
4 | EE | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes in Plaintext and Chosen-content Attacks. EUROCRYPT 1994: 254-265 |
1993 | ||
3 | EE | Reihaneh Safavi-Naini, L. Tombak: Optimal Authentication Systems. EUROCRYPT 1993: 12-27 |
1992 | ||
2 | L. Tombak, Reihaneh Safavi-Naini: Authentication Codes with Perfect Protection. AUSCRYPT 1992: 15-26 | |
1 | Reihaneh Safavi-Naini, L. Tombak: Authentication Codes under Impersonation Attack. AUSCRYPT 1992: 35-47 |
1 | Reihaneh Safavi-Naini | [1] [2] [3] [4] [5] [6] [7] [8] |