Codes Which Detect Deception

From MaRDI portal
Publication:4401320

DOI10.1002/j.1538-7305.1974.tb02751.xzbMath0275.94006OpenAlexW2028732372MaRDI QIDQ4401320

F. J. MacWilliams, N. J. A. Sloane, E. N. Gilbert

Publication date: 1974

Published in: Bell System Technical Journal (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1002/j.1538-7305.1974.tb02751.x




Related Items (83)

MMH* with arbitrary modulus is always almost-universalON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATIONVariants of Wegman-Carter message authentication code supporting variable tag lengthsEssentiallys-fold secure authentication systems of levellBounds And Constructions For Threshold Shared Generation Of AuthenticatorsThree constructions of perfect authentication codes from projective geometry over finite fieldsOn modes of operations of a block cipher for authentication and authenticated encryptionA new construction of multisender authentication codes from polynomials over finite fieldsUniversal Hashing and Multiple AuthenticationUniversal Hash Functions from Exponential Sums over Finite Fields and Galois RingsOn Fast and Provably Secure Message Authentication Based on Universal HashingConstruction of authentication codes based on orthogonal array and Latin squareA survey on fast correlation attacksStudy on the security of the authentication scheme with key recycling in QKDOptimal forgeries against polynomial-based MACs and GCMAuthentication codes for nontrusting parties obtained from rank metric codesSome constructions and bounds for authentication codesA construction for authentication/secrecy codes from certain combinatorial designsAuthentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemesUnconditionally Secure Approximate Message AuthenticationA new construction of multisender authentication codes from pseudosymplectic geometry over finite fieldsA new multi-linear universal hash familyGeometry of classical groups over finite fields and its applicationsCombinatorial bounds and characterizations of splitting authentication codesOn Weak Keys and Forgery Attacks Against Polynomial-Based MAC SchemesUnconditional Byzantine agreement for any number of faulty processorsLogarithm Cartesian authentication codes.A generalization of the formulas for intersection numbers of dual polar association schemes and their applicationsCartesian authentication codes from functions with optimal nonlinearity.Message authentication based on cryptographically secure CRC without polynomial irreducibility testCategorization of faulty nonce misuse resistant message authenticationOn weak keys and forgery attacks against polynomial-based MAC schemesOn message authentication with a correlated setupA trade-off between collision probability and key size in universal hashing using polynomialsQuantum key distribution with PRF(Hash, Nonce) achieves everlasting securityA class of authentication codes with secrecyNew hash functions and their use in authentication and set equalityAnzahl formulas of subspaces in symplectic spaces and their applicationsA construction for authentication/secrecy codes from 3-homogeneous permutation groupsAuthentication codes: An area where coding and cryptology meetSingular linear space and its applicationsTwo constructions of optimal cartesian authentication codes from unitary geometry over finite fieldsThe combinatorics of authentication and secrecy codesA Cartesian product construction for unconditionally secure authentication codes that permit arbitrationConstructions of difference covering arrays.Information-theoretic bounds for authentication schemesOn Efficient Message Authentication Via Block Cipher Design TechniquesNew bounds and constructions for authentication/secrecy codes with splittingAuthentication codes and bipartite graphsError-correcting codes and cryptographyPerennial secure multi-party computation of universal Turing machineOn an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy CodesEfficient robust secret sharing from expander graphsOn rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphersIncidence structures applied to cryptographyConstruction of Cartesian authentication codes from unitary geometryA novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fieldsA coding theory construction of new systematic authentication codesCryptanalysis of Secure Message Transmission Protocols with FeedbackThree constructions of authentication/secrecy codesModes of operations for encryption and authentication using stream ciphers supporting an initialisation vectorNew methods of construction of Cartesian authentication codes from geometries over finite commutative ringsThe circulant hash revisitedWhat is the Future of Cryptography?Systematic authentication codes using additive polynomialsCryptology: The mathematics of secure communicationКоды аутентификации с секретностью (обзор)Generalised dual arcs and Veronesean surfaces, with applications to cryptographyEWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MACPerfect difference systems of sets and Jacobi sumsMessage Authentication with Arbitration of Transmitter/Receiver DisputesUnnamed ItemSome Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)On designs in compact metric spaces and a universal bound on their sizeA construction of multisender authentication codes with sequential model from symplectic geometry over finite fieldsEconomically Optimal Variable Tag Length Message AuthenticationGeneral lower bounds for chosen-content attacks against authentication codesSeveral Anzahl theorems of alternate matrices over Galois ringsFurther results on asymmetric authentication schemesConstruction of Multi-receiver Multi-fold Authentication Codes from Singular Symplectic Geometry over Finite FieldsA lower bound on authentication after having observed a sequence of messagesOn the Security of Compressed EncodingsA shift register construction of unconditionally secure authentication codes




This page was built for publication: Codes Which Detect Deception