New bounds and constructions for authentication/secrecy codes with splitting (original) (raw)
Related papers
Bounds and Constructions for Authentication - Secrecy Codes with Splitting
Lecture Notes in Computer Science, 1990
Some Constructions for Authentication - Secrecy Codes
Lecture Notes in Computer Science, 1988
Three constructions of authentication/secrecy codes
Journal of Pure and Applied Algebra, 2005
Linear authentication codes: bounds and constructions
IEEE Transactions on Information Theory, 2003
Bounds and constructions for multireceiver authentication codes
1998
An efficient threshold verifiable multi-secret sharing
Computer Standards & Interfaces, 2008
Language & Communication, 1985
On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes
International Journal of Foundations of Computer Science
HANDBOOK of APPLIED CRYPTOGRAPHY
Improved upper bounds for codes with unequal error protection
IEEE Transactions on Information Theory, 2006
PAPER Coding Theorems for Secret-Key Authentication Systems
Universal Secure Network Coding via Rank-Metric Codes
IEEE Trans. Inf. Theory, 2008
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks
2021 IEEE International Symposium on Information Theory (ISIT)
Error-correcting pairs for a public-key cryptosystem
Journal of Physics: Conference Series, 2017
New results on multi-receiver authentication codes
1998
Enhancing cryptographic primitives with techniques from error correcting codes
2009
Bounds and characterizations of authentication/secrecy schemes
Designs, codes and cryptography, 1998
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
IEEE Transactions on Information Theory, 2008
Security and Cryptography for Networks
Lecture Notes in Computer Science, 2012
Advances in Mathematics of Communications, 2011
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions
Information and Computation, 1999
The Security of Cryptosystems Based on Error-Correcting Codes
Cryptography - Recent Advances and Future Developments, 2021
Coding Theorems for Secret-Key Authentication Systems
Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2000
A tight bound for exhaustive key search attacks against Message Authentication Codes
RAIRO - Theoretical Informatics and Applications, 2013
A class of authentication codes with secrecy
Designs, Codes and Cryptography, 2010
Advances in Cryptology — CRYPTO’ 92
Lecture Notes in Computer Science, 1993
Cryptography and Communications, 2011
A Simple Threshold Authenticated Key Exchange from Short Secrets
Lecture Notes in Computer Science, 2005
On the (Im)possibility of aggregate message authentication codes
2008 IEEE International Symposium on Information Theory, 2008
Informational Divergence Bounds for Authentication Codes
Theory and Application of Cryptographic Techniques, 1989