Optimal algebraic manipulation detection codes in the constant-error model
DOI10.1007/978-3-662-46494-6_20zbMATH Open1354.94056OpenAlexW2116018059MaRDI QIDQ5261641FDOQ5261641
Ronald Cramer, Carles Padró, Chaoping Xing
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://hdl.handle.net/10356/81331
Recommendations
- On generalised AMD codes
- Algebraic manipulation detection codes via highly nonlinear functions
- Detection of algebraic manipulation in the presence of leakage
- Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families
- Detecting algebraic manipulation in leaky storage systems
algebraic manipulation detection (AMD) codesconstant error probabilityunbounded cardinality of message space
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Other types of codes (94B60)
Cited In (14)
- Construction and nonexistence of strong external difference families
- Disjoint difference families and their applications
- Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families
- The asymptotic behavior of automorphism groups of function fields over finite fields
- Algebraic manipulation detection codes via highly nonlinear functions
- Optimal Computational Split-state Non-malleable Codes
- Nonexistence of strong external difference families in abelian groups of order being product of at most three primes
- On optimal weak algebraic manipulation detection codes and weighted external difference families
- Nearly optimal robust secret sharing
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Weighted external difference families and R-optimal AMD codes
- New existence and nonexistence results for strong external difference families
- Some results on generalized strong external difference families
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
This page was built for publication: Optimal algebraic manipulation detection codes in the constant-error model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261641)