PAPER Coding Theorems for Secret-Key Authentication Systems (original) (raw)

Coding theorems for secret-key authentication systems

Hirosuke Yamamoto

View PDFchevron_right

An Information-Theoretic Analysis of the Security of Communication Systems Employing the Encoding-Encryption Paradigm

Miodrag Mihaljevic

2010

View PDFchevron_right

Information-Theoretic Bounds for Authentication Frauds

Andrea Sgarro^

Lecture Notes in Computer Science, 1993

View PDFchevron_right

Some remarks on authentication systems

Jennifer Seberry

Lecture Notes in Computer Science, 2000

View PDFchevron_right

Authentication Over Noisy Channels

Hesham Gamal

IEEE Transactions on Information Theory, 2009

View PDFchevron_right

Informational Divergence Bounds for Authentication Codes

Andrea Sgarro^

Theory and Application of Cryptographic Techniques, 1989

View PDFchevron_right

Linear authentication codes: bounds and constructions

Huaxiong Wang

IEEE Transactions on Information Theory, 2003

View PDFchevron_right

Hybrid authentication based on noisy channels

Guillermo Luna

International Journal of Information Security, 2003

View PDFchevron_right

Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models

adam smith

IEEE Transactions on Information Theory, 2008

View PDFchevron_right

Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System

Bagus Santoso

ArXiv, 2018

View PDFchevron_right

Expected loss bounds for authentication in constrained channels

Christos Dimitrakakis

View PDFchevron_right

A subliminal channel in codes for authentication without secrecy

Jennifer Seberry

1985

View PDFchevron_right

A tight bound for exhaustive key search attacks against Message Authentication Codes

Davidson Boccardo

RAIRO - Theoretical Informatics and Applications, 2013

View PDFchevron_right

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks †

Bagus Santoso

Entropy, 2019

View PDFchevron_right

ARTIFICIAL-NOISE-AIDED MESSAGE AUTHENTICATION CODES WITH INFORMATION-THEORETIC SECURITY

IAEME Publication

View PDFchevron_right

Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches

Stefano Tomasin

IEEE Transactions on Wireless Communications

View PDFchevron_right

Multireceiver Authentication Codes: Models, Bounds, Constructions, and Extensions

Huaxiong Wang

Information and Computation, 1999

View PDFchevron_right

Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels

Ram Kumar Rengaswamy

IEEE Transactions on Dependable and Secure Computing, 2000

View PDFchevron_right

Integrity (I) codes: message integrity protection and authentication over insecure channels

Ram Kumar Rengaswamy

2006 IEEE Symposium on Security and Privacy (S&P'06), 2006

View PDFchevron_right

Expected loss analysis for authentication in constrained channels

Christos Dimitrakakis

View PDFchevron_right

Three constructions of authentication/secrecy codes

Patrick Sole

Journal of Pure and Applied Algebra, 2005

View PDFchevron_right

SPECIAL ISSUE ON INFORMATION THEORETIC SECURITY

Takeshi Koshiba

View PDFchevron_right

Coding Theorems for the Shannon Cipher System With a Guessing Wiretapper and Correlated Source Outputs

Hirosuke Yamamoto

IEEE Transactions on Information Theory, 2000

View PDFchevron_right

Information-theoretic analysis of electronic and printed document authentication

Sviatoslav Voloshynovskiy

Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

View PDFchevron_right

Coding theorems for a (2, 2)-threshold scheme secure against impersonation by an opponent

Hirosuke Yamamoto

2009 IEEE Information Theory Workshop, 2009

View PDFchevron_right

New results on multi-receiver authentication codes

Huaxiong Wang

1998

View PDFchevron_right

Quantum authentication with unitary coding sets

David Santos

Journal of Modern Optics, 2003

View PDFchevron_right

Vulnerability Analysis of Authenticated Encryption

IJARTET Journal

View PDFchevron_right

A Mathematical Theory of Cryptography

sean gao

View PDFchevron_right

Bounds and Characterizations of Authentication/Secrecy Schemes

Keith Martin

Designs, Codes and Cryptography, 1998

View PDFchevron_right