The combinatorics of authentication and secrecy codes

From MaRDI portal
Publication:914645


DOI10.1007/BF02252868zbMath0701.94006MaRDI QIDQ914645

Douglas R. Stinson

Publication date: 1990

Published in: Journal of Cryptology (Search for Journal in Brave)


94A60: Cryptography


Related Items

Bounds And Constructions For Threshold Shared Generation Of Authenticators, Isomorphism classes of authentication codes, Broadcast authentication for group communication, GOB designs for authentication codes with arbitration, Information-theoretic bounds for authentication schemes, Authentication codes and bipartite graphs, New bounds and constructions for authentication/secrecy codes with splitting, Halving \(\mathrm{PGL}(2,2^f)\), \(f\) odd: a series of cryptocodes, Some highly symmetric authentication perpendicular arrays, Incidence structures applied to cryptography, Combinatorial characterizations of authentication codes, Construction of 2-designs, A lower bound on authentication after having observed a sequence of messages, A family of perpendicular arrays achieving perfect 4-fold secrecy, Universal hashing and authentication codes, Cartesian authentication codes from functions with optimal nonlinearity., Existence of APAV\((q,k)\) with \(q\) a prime power \(\equiv 5 \pmod 8\) and \(k\equiv 1 \pmod 4\)., The uniformly 3-homogeneous subsets of PGL\((2,q)\), On the construction of authentication and secrecy codes, Multireceiver authentication codes: Models, bounds, constructions, and extensions, Information-theoretic bounds for authentication codes and block designs, Authentication codes for nontrusting parties obtained from rank metric codes, Authentication codes in plaintext and chosen-content attacks, Subspaces in \(d\)-bounded distance-regular graphs and their applications, A TWOOA construction for multi-receiver multi-message authentication codes



Cites Work