Bounds and characterizations of authentication/secrecy schemes (original) (raw)
Related papers
Three constructions of authentication/secrecy codes
Journal of Pure and Applied Algebra, 2005
Lower Bound on Linear Authenticated Encryption
Lecture Notes in Computer Science, 2004
Linear authentication codes: bounds and constructions
IEEE Transactions on Information Theory, 2003
Some remarks on authentication systems
Lecture Notes in Computer Science, 2000
Coding theorems for secret-key authentication systems
Information-Theoretic Bounds for Authentication Frauds
Lecture Notes in Computer Science, 1993
PAPER Coding Theorems for Secret-Key Authentication Systems
Coding theorems for a (2, 2)-threshold scheme secure against impersonation by an opponent
2009 IEEE Information Theory Workshop, 2009
Constructions, Lower Bounds, and New Directions in Cryptography and Computational Complexity
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
Lecture Notes in Computer Science, 2006
Relating two standard notions of secrecy
Logical Methods in Computer Science, 2007
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
Journal of Cryptology, 2008
On the Security Notions for Public-Key Encryption Schemes
2004
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
IEEE Transactions on Information Theory, 2008
Bounds and Constructions for Authentication - Secrecy Codes with Splitting
Lecture Notes in Computer Science, 1990
Characterization of Security Notions for Probabilistic Private-Key Encryption
2006
Inductive Proofs of Computational Secrecy
2007
Some Constructions for Authentication - Secrecy Codes
Lecture Notes in Computer Science, 1988
A class of authentication codes with secrecy
Designs, Codes and Cryptography, 2010
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes
2002
IEEE Transactions on Dependable and Secure Computing, 2015
New bounds and constructions for authentication/secrecy codes with splitting
Journal of Cryptology, 1991
A Note on Security Proofs in the Generic Model
Lecture Notes in Computer Science, 2000
Advances in Cryptology – ASIACRYPT 2017, 2017
Structural Classifcation of Authenticated Encryption Schemes
2020
Informational Divergence Bounds for Authentication Codes
Theory and Application of Cryptographic Techniques, 1989
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
Public-Key Cryptography – PKC 2018, 2018
Security of Discrete Log Cryptosystems in the Random Oracle and the Generic Model
2005
Linear zero-knowledge---a note on efficient zero-knowledge proofs and arguments
Proceedings of the twenty-ninth annual ACM symposium on Theory of computing - STOC '97, 1997
Stronger Notions of Secure Computation
2009
Relations Among Notions of Security for Identity Based Encryption Schemes
Lecture Notes in Computer Science, 2006