New bounds and constructions for authentication/secrecy codes with splitting (original) (raw)

Bounds and Constructions for Authentication - Secrecy Codes with Splitting

Marijke Soete

Lecture Notes in Computer Science, 1990

View PDFchevron_right

Some Constructions for Authentication - Secrecy Codes

Marijke Soete

Lecture Notes in Computer Science, 1988

View PDFchevron_right

Three constructions of authentication/secrecy codes

Patrick Sole

Journal of Pure and Applied Algebra, 2005

View PDFchevron_right

Linear authentication codes: bounds and constructions

Huaxiong Wang

IEEE Transactions on Information Theory, 2003

View PDFchevron_right

Bounds and constructions for multireceiver authentication codes

Huaxiong Wang

1998

View PDFchevron_right

An efficient threshold verifiable multi-secret sharing

Massoud H Dehkordi

Computer Standards & Interfaces, 2008

View PDFchevron_right

The fixed-code theory

Nigel Love

Language & Communication, 1985

View PDFchevron_right

On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes

Bruce Kapron

International Journal of Foundations of Computer Science

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Irarem Zurc

View PDFchevron_right

Improved upper bounds for codes with unequal error protection

Simon Litsyn

IEEE Transactions on Information Theory, 2006

View PDFchevron_right

PAPER Coding Theorems for Secret-Key Authentication Systems

Hirosuke Yamamoto

View PDFchevron_right

Universal Secure Network Coding via Rank-Metric Codes

Danilo Carvalho Silva

IEEE Trans. Inf. Theory, 2008

View PDFchevron_right

Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks

Anat Paskin-Cherniavsky

2021 IEEE International Symposium on Information Theory (ISIT)

View PDFchevron_right

Error-correcting pairs for a public-key cryptosystem

R. Pellikaan

Journal of Physics: Conference Series, 2017

View PDFchevron_right

New results on multi-receiver authentication codes

Huaxiong Wang

1998

View PDFchevron_right

Enhancing cryptographic primitives with techniques from error correcting codes

Vincent Rijmen

2009

View PDFchevron_right

Bounds and characterizations of authentication/secrecy schemes

Keith Martin

Designs, codes and cryptography, 1998

View PDFchevron_right

Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models

adam smith

IEEE Transactions on Information Theory, 2008

View PDFchevron_right

Security and Cryptography for Networks

Juan A. Garay

Lecture Notes in Computer Science, 2012

View PDFchevron_right

Infinite families of optimal splitting authentication codes secure against spoofing attacks of higher order

Yeow Meng Chee

Advances in Mathematics of Communications, 2011

View PDFchevron_right

Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions

Huaxiong Wang

Information and Computation, 1999

View PDFchevron_right

The Security of Cryptosystems Based on Error-Correcting Codes

ahmed drissi

Cryptography - Recent Advances and Future Developments, 2021

View PDFchevron_right

Coding Theorems for Secret-Key Authentication Systems

Hirosuke Yamamoto

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2000

View PDFchevron_right

A tight bound for exhaustive key search attacks against Message Authentication Codes

Davidson Boccardo

RAIRO - Theoretical Informatics and Applications, 2013

View PDFchevron_right

A class of authentication codes with secrecy

elif kurtaran ozbudak

Designs, Codes and Cryptography, 2010

View PDFchevron_right

Advances in Cryptology — CRYPTO’ 92

Tatsuaki Okamoto

Lecture Notes in Computer Science, 1993

View PDFchevron_right

Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

Maura Paterson

Cryptography and Communications, 2011

View PDFchevron_right

A Simple Threshold Authenticated Key Exchange from Short Secrets

Pierre-alain Fouque

Lecture Notes in Computer Science, 2005

View PDFchevron_right

On the (Im)possibility of aggregate message authentication codes

Aldar Chan

2008 IEEE International Symposium on Information Theory, 2008

View PDFchevron_right

Informational Divergence Bounds for Authentication Codes

Andrea Sgarro^

Theory and Application of Cryptographic Techniques, 1989

View PDFchevron_right