Authentication is one of the basic cryptographic techniques. Its aim is to provide a receiver with some kind of proof that the information comes from the intended sender. In this chapter we are going to discuss authentication whose security is unconditional, i.e., its security is independent of the computational power of a potential attacker. Simmons wrote a good review on the subject in . Stinson treated authentication in Chap. 10 of his book .
Weitere Kapitel dieses Buchs durch Wischen aufrufen
Prof. Dr. Josef Pieprzyk
Dr. Thomas Hardjono
Prof. Dr. Jennifer Seberry
- Springer Berlin Heidelberg