Bounds and constructions for multireceiver authentication codes (original) (raw)

Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions

Huaxiong Wang

Information and Computation, 1999

View PDFchevron_right

New results on multi-receiver authentication codes

Huaxiong Wang

1998

View PDFchevron_right

Linear authentication codes: bounds and constructions

Huaxiong Wang

IEEE Transactions on Information Theory, 2003

View PDFchevron_right

Rateless Codes for the Multicast Stream Authentication Problem

Huaxiong Wang

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Three constructions of authentication/secrecy codes

Patrick Sole

Journal of Pure and Applied Algebra, 2005

View PDFchevron_right

A coding approach to the multicast stream authentication problem

Huaxiong Wang

International Journal of Information Security, 2008

View PDFchevron_right

PAPER Coding Theorems for Secret-Key Authentication Systems

Hirosuke Yamamoto

View PDFchevron_right

Efficient and unconditionally secure digital signatures and a security analysis of a multireceiver authentication code

Hideki Imai

Public Key Cryptography, 2002

View PDFchevron_right

On the (Im)possibility of aggregate message authentication codes

Aldar Chan

2008 IEEE International Symposium on Information Theory, 2008

View PDFchevron_right

Bounds and Constructions for Authentication - Secrecy Codes with Splitting

Marijke Soete

Lecture Notes in Computer Science, 1990

View PDFchevron_right

Secure-broadcast codes over linear-deterministic channels

Danilo Silva

2010 IEEE International Symposium on Information Theory, 2010

View PDFchevron_right

Error-correcting codes for multipermutations

T. Etzion

2013 IEEE International Symposium on Information Theory, 2013

View PDFchevron_right

A Linear Programming bound for Unequal Error Protection codes

Toshiyasu Matsushima

2010 Australian Communications Theory Workshop (AusCTW), 2010

View PDFchevron_right

Improved upper bounds for codes with unequal error protection

Simon Litsyn

IEEE Transactions on Information Theory, 2006

View PDFchevron_right

Combinatorial Constructions of 3- and 4-Secure Codes

Jennifer Seberry, Tadeusz Wysocki

View PDFchevron_right

Algebraic Message Authentication Codes

Abhinav Aggarwal

View PDFchevron_right

On a class of optimal nonbinary linear unequal-error-protection codes for two sets of messages

Robert Morelos-Zaragoza

IEEE Transactions on Information Theory, 1994

View PDFchevron_right

Informational Divergence Bounds for Authentication Codes

Andrea Sgarro^

Theory and Application of Cryptographic Techniques, 1989

View PDFchevron_right

New bounds and constructions for authentication/secrecy codes with splitting

Marijke Soete

Journal of Cryptology, 1991

View PDFchevron_right

Broadcast authentication for group communication

Rei Safavi-naini

Theoretical Computer Science, 2001

View PDFchevron_right

Bounds on linear codes for network multicast

Meir Feder

Electronic Colloquium on …, 2003

View PDFchevron_right

Several new lower bounds on the size of codes with covering radius one

Simon Litsyn

Ieee Transactions on Information Theory, 1998

View PDFchevron_right

Formalization of Error-Correcting Codes: From Hamming to Modern Coding Theory

Jacques Garrigue

Interactive Theorem Proving, 2015

View PDFchevron_right

A Method for the Construction of Minimum-Redundancy Codes

Edgar Omar L C

View PDFchevron_right

Improved lower bounds on sizes of single-error correcting codes

Simon Litsyn

2007

View PDFchevron_right

Broadcast Authentication in Group Communication

Rei Safavi-naini

Lecture Notes in Computer Science, 1999

View PDFchevron_right

Coding theorems for secret-key authentication systems

Hirosuke Yamamoto

View PDFchevron_right

Some Constructions for Authentication - Secrecy Codes

Marijke Soete

Lecture Notes in Computer Science, 1988

View PDFchevron_right

Error Correction for a Secure Multicast Group Key Management using Gray Code

Rhymend Uthariaraj

International Journal of Computer Applications, 2013

View PDFchevron_right

Computational Hardness and Explicit Constructions of Error Correcting Codes

Mahdi Cheraghchi

Fourty-Fourth Annual …, 2006

View PDFchevron_right

Weakly secure data exchange with Generalized Reed Solomon codes

Igor Zelenko

2014

View PDFchevron_right