Codes Which Detect Deception
From MaRDI portal
Publication:4401320
Recommendations
Cited in
(83)- On Efficient Message Authentication Via Block Cipher Design Techniques
- Construction of authentication codes based on orthogonal array and Latin square
- scientific article; zbMATH DE number 7310202 (Why is no real title available?)
- A new construction of multisender authentication codes from polynomials over finite fields
- Several Anzahl theorems of alternate matrices over Galois rings
- Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security
- Anzahl formulas of subspaces in symplectic spaces and their applications
- A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields
- On ``the power of verification queries in unconditionally secure message authentication
- A class of authentication codes with secrecy
- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)
- What is the Future of Cryptography?
- General lower bounds for chosen-content attacks against authentication codes
- On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
- Bounds And Constructions For Threshold Shared Generation Of Authenticators
- Essentiallys-fold secure authentication systems of levell
- Коды аутентификации с секретностью (обзор)
- Categorization of faulty nonce misuse resistant message authentication
- Authentication codes: an area where coding and cryptology meet
- New methods of construction of Cartesian authentication codes from geometries over finite commutative rings
- A construction of multisender authentication codes with sequential model from symplectic geometry over finite fields
- Authentication codes for nontrusting parties obtained from rank metric codes
- MMH* with arbitrary modulus is always almost-universal
- Authentication codes and bipartite graphs
- Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
- On the security of compressed encodings
- A lower bound on authentication after having observed a sequence of messages
- Variants of Wegman-Carter message authentication code supporting variable tag lengths
- Logarithm Cartesian authentication codes.
- Message authentication based on cryptographically secure CRC without polynomial irreducibility test
- The combinatorics of authentication and secrecy codes
- Optimal forgeries against polynomial-based MACs and GCM
- Cryptanalysis of secure message transmission protocols with feedback
- Construction of multi-receiver multi-fold authentication codes from singular symplectic geometry over finite fields
- Three constructions of authentication/secrecy codes
- A generalization of the formulas for intersection numbers of dual polar association schemes and their applications
- A construction for authentication/secrecy codes from 3-homogeneous permutation groups
- A Cartesian product construction for unconditionally secure authentication codes that permit arbitration
- Cartesian authentication codes from functions with optimal nonlinearity.
- Incidence structures applied to cryptography
- Generalised dual arcs and Veronesean surfaces, with applications to cryptography
- On message authentication with a correlated setup
- Unconditionally Secure Approximate Message Authentication
- Geometry of classical groups over finite fields and its applications
- A survey on fast correlation attacks
- On modes of operations of a block cipher for authentication and authenticated encryption
- EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
- New bounds and constructions for authentication/secrecy codes with splitting
- Efficient robust secret sharing from expander graphs
- Message authentication with arbitration of transmitter/receiver disputes
- A new multi-linear universal hash family
- Information-theoretic bounds for authentication schemes
- A new construction of multisender authentication codes from pseudosymplectic geometry over finite fields
- On fast and provably secure message authentication based on universal hashing
- Economically optimal variable tag length message authentication
- Two constructions of optimal cartesian authentication codes from unitary geometry over finite fields
- On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes
- Further results on asymmetric authentication schemes
- Unconditional Byzantine agreement for any number of faulty processors (extended abstract)
- The circulant hash revisited
- A coding theory construction of new systematic authentication codes
- Combinatorial bounds and characterizations of splitting authentication codes
- A construction for authentication/secrecy codes from certain combinatorial designs
- A trade-off between collision probability and key size in universal hashing using polynomials
- Some constructions and bounds for authentication codes
- Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes
- Systematic authentication codes using additive polynomials
- On designs in compact metric spaces and a universal bound on their size
- Error-correcting codes and cryptography
- Construction of Cartesian authentication codes from unitary geometry
- Study on the security of the authentication scheme with key recycling in QKD
- Perennial secure multi-party computation of universal Turing machine
- Constructions of difference covering arrays.
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Singular linear space and its applications
- Perfect difference systems of sets and Jacobi sums
- New hash functions and their use in authentication and set equality
- Cryptology: The mathematics of secure communication
- A shift register construction of unconditionally secure authentication codes
- Universal hashing and multiple authentication
- Three constructions of perfect authentication codes from projective geometry over finite fields
- On weak keys and forgery attacks against polynomial-based MAC schemes
- Universal hash functions from exponential sums over finite fields and Galois rings
This page was built for publication: Codes Which Detect Deception
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4401320)