Bounds and characterizations of authentication/secrecy schemes (original) (raw)

Three constructions of authentication/secrecy codes

Patrick Sole

Journal of Pure and Applied Algebra, 2005

View PDFchevron_right

Lower Bound on Linear Authenticated Encryption

Charanjit Jutla

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Linear authentication codes: bounds and constructions

Huaxiong Wang

IEEE Transactions on Information Theory, 2003

View PDFchevron_right

Some remarks on authentication systems

Jennifer Seberry

Lecture Notes in Computer Science, 2000

View PDFchevron_right

Coding theorems for secret-key authentication systems

Hirosuke Yamamoto

View PDFchevron_right

Information-Theoretic Bounds for Authentication Frauds

Andrea Sgarro^

Lecture Notes in Computer Science, 1993

View PDFchevron_right

PAPER Coding Theorems for Secret-Key Authentication Systems

Hirosuke Yamamoto

View PDFchevron_right

Coding theorems for a (2, 2)-threshold scheme secure against impersonation by an opponent

Hirosuke Yamamoto

2009 IEEE Information Theory Workshop, 2009

View PDFchevron_right

Constructions, Lower Bounds, and New Directions in Cryptography and Computational Complexity

Periklis Papakonstantinou

View PDFchevron_right

Computationally Sound Symbolic Secrecy in the Presence of Hash Functions

Bogdan Warinschi

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Relating two standard notions of secrecy

Reinhard Wilhelm

Logical Methods in Computer Science, 2007

View PDFchevron_right

Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm

Habtamu Abie

Journal of Cryptology, 2008

View PDFchevron_right

On the Security Notions for Public-Key Encryption Schemes

Hieu Phan

2004

View PDFchevron_right

Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models

adam smith

IEEE Transactions on Information Theory, 2008

View PDFchevron_right

Bounds and Constructions for Authentication - Secrecy Codes with Splitting

Marijke Soete

Lecture Notes in Computer Science, 1990

View PDFchevron_right

Characterization of Security Notions for Probabilistic Private-Key Encryption

Jonathan Katz

2006

View PDFchevron_right

Inductive Proofs of Computational Secrecy

Anupam Datta

2007

View PDFchevron_right

Some Constructions for Authentication - Secrecy Codes

Marijke Soete

Lecture Notes in Computer Science, 1988

View PDFchevron_right

A class of authentication codes with secrecy

elif kurtaran ozbudak

Designs, Codes and Cryptography, 2010

View PDFchevron_right

On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes

Ron Steinfeld

2002

View PDFchevron_right

On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting

Massimo Cafaro

IEEE Transactions on Dependable and Secure Computing, 2015

View PDFchevron_right

New bounds and constructions for authentication/secrecy codes with splitting

Marijke Soete

Journal of Cryptology, 1991

View PDFchevron_right

A Note on Security Proofs in the Generic Model

Marc Fischlin

Lecture Notes in Computer Science, 2000

View PDFchevron_right

Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions

Amit Sahai

Advances in Cryptology – ASIACRYPT 2017, 2017

View PDFchevron_right

Structural Classifcation of Authenticated Encryption Schemes

NILanjan Datta

2020

View PDFchevron_right

Informational Divergence Bounds for Authentication Codes

Andrea Sgarro^

Theory and Application of Cryptographic Techniques, 1989

View PDFchevron_right

New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes

Mohammad Hajiabadi

Public-Key Cryptography – PKC 2018, 2018

View PDFchevron_right

Security of Discrete Log Cryptosystems in the Random Oracle and the Generic Model

Markus Jakobsson

2005

View PDFchevron_right

Linear zero-knowledge---a note on efficient zero-knowledge proofs and arguments

Ivan Damgård

Proceedings of the twenty-ninth annual ACM symposium on Theory of computing - STOC '97, 1997

View PDFchevron_right

Stronger Notions of Secure Computation

akshay goyal

2009

View PDFchevron_right

Relations Among Notions of Security for Identity Based Encryption Schemes

Hideki Imai

Lecture Notes in Computer Science, 2006

View PDFchevron_right