PAPER Coding Theorems for Secret-Key Authentication Systems (original) (raw)
Related papers
Coding theorems for secret-key authentication systems
2010
Information-Theoretic Bounds for Authentication Frauds
Lecture Notes in Computer Science, 1993
Some remarks on authentication systems
Lecture Notes in Computer Science, 2000
Authentication Over Noisy Channels
IEEE Transactions on Information Theory, 2009
Informational Divergence Bounds for Authentication Codes
Theory and Application of Cryptographic Techniques, 1989
Linear authentication codes: bounds and constructions
IEEE Transactions on Information Theory, 2003
Hybrid authentication based on noisy channels
International Journal of Information Security, 2003
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models
IEEE Transactions on Information Theory, 2008
Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System
ArXiv, 2018
Expected loss bounds for authentication in constrained channels
A subliminal channel in codes for authentication without secrecy
1985
A tight bound for exhaustive key search attacks against Message Authentication Codes
RAIRO - Theoretical Informatics and Applications, 2013
Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †
Entropy, 2019
ARTIFICIAL-NOISE-AIDED MESSAGE AUTHENTICATION CODES WITH INFORMATION-THEORETIC SECURITY
Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches
IEEE Transactions on Wireless Communications
Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions
Information and Computation, 1999
Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels
IEEE Transactions on Dependable and Secure Computing, 2000
Integrity (I) codes: message integrity protection and authentication over insecure channels
2006 IEEE Symposium on Security and Privacy (S&P'06), 2006
Expected loss analysis for authentication in constrained channels
Three constructions of authentication/secrecy codes
Journal of Pure and Applied Algebra, 2005
SPECIAL ISSUE ON INFORMATION THEORETIC SECURITY
IEEE Transactions on Information Theory, 2000
Information-theoretic analysis of electronic and printed document authentication
Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
Coding theorems for a (2, 2)-threshold scheme secure against impersonation by an opponent
2009 IEEE Information Theory Workshop, 2009
New results on multi-receiver authentication codes
1998
Quantum authentication with unitary coding sets
Journal of Modern Optics, 2003
Vulnerability Analysis of Authenticated Encryption
A Mathematical Theory of Cryptography
Bounds and Characterizations of Authentication/Secrecy Schemes
Designs, Codes and Cryptography, 1998