Leonid M. Tombak

According to our database1, Leonid M. Tombak authored at least 9 papers between 1991 and 1996.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1996
Authentication Codes in Plaintext and Chosen-Content Attacks.
Des. Codes Cryptogr., 1996

Near-perfect protection and key strategies in authentication codes under spoofing attack of order r.
Ars Comb., 1996

1994
Authentication Codes That Are <i>r</i>-Fold Secure Against Spoofing.
Proceedings of the CCS '94, 1994

Combinatorial Structure of A-codes with r-fold Security.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Optimal Authentication Systems.
Proceedings of the Advances in Cryptology, 1993

1992
Authentication Codes with Perfect Protection.
Proceedings of the Advances in Cryptology, 1992

Authentication Codes under Impersonation Attack.
Proceedings of the Advances in Cryptology, 1992

1991
Linear codes with covering radius 2 and other new covering codes.
IEEE Trans. Inf. Theory, 1991

An alternative to the Hamming code in the class of SEC-DED codes in semiconductor memory.
IEEE Trans. Inf. Theory, 1991


  Loading...