The combinatorics of authentication and secrecy codes

From MaRDI portal
Publication:914645

DOI10.1007/BF02252868zbMath0701.94006MaRDI QIDQ914645

Douglas R. Stinson

Publication date: 1990

Published in: Journal of Cryptology (Search for Journal in Brave)




Related Items (40)

ON "THE POWER OF VERIFICATION QUERIES" IN UNCONDITIONALLY SECURE MESSAGE AUTHENTICATIONUniversal hashing and authentication codesBounds And Constructions For Threshold Shared Generation Of AuthenticatorsConstruction of authentication codes based on orthogonal array and Latin squareGOB designs for authentication codes with arbitrationInformation-theoretic bounds for authentication codes and block designsA construction for optimal \(c\)-splitting authentication and secrecy codesAuthentication codes for nontrusting parties obtained from rank metric codesIsomorphism classes of authentication codesAuthentication codes in plaintext and chosen-content attacksCombinatorial bounds and characterizations of splitting authentication codesCombinational constructions of splitting authentication codes with perfect secrecyAssociation schemes based on singular symplectic geometry over finite fields and its applicationSplitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codesCartesian authentication codes from functions with optimal nonlinearity.Subspaces in \(d\)-bounded distance-regular graphs and their applicationsA TWOOA construction for multi-receiver multi-message authentication codesAlgebraic manipulation detection codesTwo constructions of optimal cartesian authentication codes from unitary geometry over finite fieldsInformation-theoretic bounds for authentication schemesExistence of APAV\((q,k)\) with \(q\) a prime power \(\equiv 5 \pmod 8\) and \(k\equiv 1 \pmod 4\).New bounds and constructions for authentication/secrecy codes with splittingAuthentication codes and bipartite graphsHalving \(\mathrm{PGL}(2,2^f)\), \(f\) odd: a series of cryptocodesSome highly symmetric authentication perpendicular arraysIncidence structures applied to cryptographyCombinatorial characterizations of authentication codesBroadcast authentication for group communicationOn the equivalence of authentication codes and robust (2, 2)-threshold schemesLarge sets with multiplicityThe uniformly 3-homogeneous subsets of PGL\((2,q)\)On the construction of authentication and secrecy codesКоды аутентификации с секретностью (обзор)Construction of 2-designsOn \((t, L)\)-fold perfect authentication and secrecy codes with arbitrationUnnamed ItemMultireceiver authentication codes: Models, bounds, constructions, and extensionsA lower bound on authentication after having observed a sequence of messagesQuantum Authentication with Key RecyclingA family of perpendicular arrays achieving perfect 4-fold secrecy



Cites Work


This page was built for publication: The combinatorics of authentication and secrecy codes