Authentication Theory/Coding Theory

From MaRDI portal
Publication:3695175

DOI10.1007/3-540-39568-7_32zbMath0575.94011OpenAlexW1743965195MaRDI QIDQ3695175

Gustavus J. Simmons

Publication date: 1985

Published in: Advances in Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-39568-7_32




Related Items (56)

Complete weight enumerators of some linear codes and their applicationsUniversal Hash Functions from Exponential Sums over Finite Fields and Galois RingsConstruction of authentication codes based on orthogonal array and Latin squareInformation-theoretic bounds for authentication codes and block designsA construction for optimal \(c\)-splitting authentication and secrecy codesSome constructions and bounds for authentication codesA construction for authentication/secrecy codes from certain combinatorial designsIsomorphism classes of authentication codesAuthentication codes in plaintext and chosen-content attacksNew Family of Non-Cartesian Perfect Authentication CodesUnconditionally Secure Approximate Message AuthenticationGeometry of classical groups over finite fields and its applicationsConstruction of Cartesian Authentication Codes from Pseudo Symplectic GeometryCombinational constructions of splitting authentication codes with perfect secrecyAssociation schemes based on singular symplectic geometry over finite fields and its applicationSplitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codesNew bound for affine resolvable designs and its application to authentication codesCartesian authentication codes from functions with optimal nonlinearity.Subspaces in \(d\)-bounded distance-regular graphs and their applicationsMessage authentication based on cryptographically secure CRC without polynomial irreducibility testReverse firewalls for adaptively secure MPC without setupA TWOOA construction for multi-receiver multi-message authentication codesA construction for authentication/secrecy codes from 3-homogeneous permutation groupsAlgebraic manipulation detection codesThe combinatorics of authentication and secrecy codesA Cartesian product construction for unconditionally secure authentication codes that permit arbitrationConstructions of difference covering arrays.Information-theoretic bounds for authentication schemesCodes for Detection of Limited View Algebraic TamperingNew combinatorial designs and their applications to authentication codes and secret sharing schemes.Complete weight enumerators of two classes of linear codesOn Efficient Message Authentication Via Block Cipher Design TechniquesNew bounds and constructions for authentication/secrecy codes with splittingAuthentication codes and bipartite graphsTHE SOLUTION OF SOME CLASSES OF MATRIX GAMESIncidence structures applied to cryptographyCombinatorial characterizations of authentication codesA novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fieldsA coding theory construction of new systematic authentication codesA new class of optimal 3-splitting authentication codesA-codes from rational functions over Galois ringsThree constructions of authentication/secrecy codesNew constructions of systematic authentication codes from three classes of cyclic codesNew methods of construction of Cartesian authentication codes from geometries over finite commutative ringsOn the equivalence of authentication codes and robust (2, 2)-threshold schemesCombinatorial characterizations of algebraic manipulation detection codes involving generalized difference familiesКоды аутентификации с секретностью (обзор)Keyed hash functionsMessage Authentication with Arbitration of Transmitter/Receiver DisputesSome Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)Economically Optimal Variable Tag Length Message AuthenticationFurther results on asymmetric authentication schemesMultireceiver authentication codes: Models, bounds, constructions, and extensionsA lower bound on authentication after having observed a sequence of messagesAssociation schemes based on singular linear spaces and its applicationsQuantum Authentication with Key Recycling




This page was built for publication: Authentication Theory/Coding Theory