Authentication Theory/Coding Theory
From MaRDI portal
Publication:3695175
Recommendations
Cited in
(71)- Codes Which Detect Deception
- Unconditionally Secure Approximate Message Authentication
- Geometry of classical groups over finite fields and its applications
- Constructions of difference covering arrays.
- Reverse firewalls for adaptively secure MPC without setup
- Коды аутентификации с секретностью (обзор)
- A lower bound on authentication after having observed a sequence of messages
- Some constructions and bounds for authentication codes
- scientific article; zbMATH DE number 4158546 (Why is no real title available?)
- Cryptography and Coding
- Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
- Authentication theory and hypothesis testing
- scientific article; zbMATH DE number 67089 (Why is no real title available?)
- A construction for optimal \(c\)-splitting authentication and secrecy codes
- New bound for affine resolvable designs and its application to authentication codes
- On the equivalence of authentication codes and robust (2, 2)-threshold schemes
- Three constructions of authentication/secrecy codes
- A new class of optimal 3-splitting authentication codes
- Economically optimal variable tag length message authentication
- Blind coding: authentication frauds from the point of view of rate-distortion theory
- Codes for detection of limited view algebraic tampering
- Complete weight enumerators of some linear codes and their applications
- scientific article; zbMATH DE number 3893245 (Why is no real title available?)
- Construction of Cartesian Authentication Codes from Pseudo Symplectic Geometry
- Association schemes based on singular linear spaces and its applications
- Construction of authentication codes based on orthogonal array and Latin square
- A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields
- Subspaces in \(d\)-bounded distance-regular graphs and their applications
- Isomorphism classes of authentication codes
- Multireceiver authentication codes: Models, bounds, constructions, and extensions
- Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families
- Information-theoretic bounds for authentication codes and block designs
- Authentication codes in plaintext and chosen-content attacks
- The solution of some classes of matrix games
- The combinatorics of authentication and secrecy codes
- New bounds and constructions for authentication/secrecy codes with splitting
- A Cartesian product construction for unconditionally secure authentication codes that permit arbitration
- Universal hash functions from exponential sums over finite fields and Galois rings
- Further results on asymmetric authentication schemes
- A TWOOA construction for multi-receiver multi-message authentication codes
- scientific article; zbMATH DE number 4148026 (Why is no real title available?)
- New constructions of systematic authentication codes from three classes of cyclic codes
- Combinatorial characterizations of authentication codes
- Message authentication with arbitration of transmitter/receiver disputes
- scientific article; zbMATH DE number 1504674 (Why is no real title available?)
- On Efficient Message Authentication Via Block Cipher Design Techniques
- A unified and generalized treatment of authentication theory
- Combinational constructions of splitting authentication codes with perfect secrecy
- Authentication codes: an area where coding and cryptology meet
- New combinatorial designs and their applications to authentication codes and secret sharing schemes.
- New methods of construction of Cartesian authentication codes from geometries over finite commutative rings
- Keyed hash functions
- scientific article; zbMATH DE number 826072 (Why is no real title available?)
- Association schemes based on singular symplectic geometry over finite fields and its application
- Codeword distinguishability in minimum diversity decoding
- On message authentication with a correlated setup
- Information-theoretic bounds for authentication schemes
- A coding theory construction of new systematic authentication codes
- A-codes from rational functions over Galois rings
- Authentication With Distortion Criteria
- New Family of Non-Cartesian Perfect Authentication Codes
- A construction for authentication/secrecy codes from 3-homogeneous permutation groups
- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)
- A construction for authentication/secrecy codes from certain combinatorial designs
- Authentication codes and bipartite graphs
- Incidence structures applied to cryptography
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test
- Algebraic manipulation detection codes
- Cartesian authentication codes from functions with optimal nonlinearity.
- Quantum authentication with key recycling
- Error-correcting codes for authentication and subliminal channels
This page was built for publication: Authentication Theory/Coding Theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3695175)