Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Combinatorics of experimental design
Combinatorics of experimental design
Non-trivial t-designs without repeated blocks exist for all t
Discrete Mathematics
Some constructions for authentication-secrecy codes
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
A construction for authentication/secrecy codes from certain combinatorial designs
Journal of Cryptology
A combinatorial approach to threshold schemes
SIAM Journal on Discrete Mathematics
Combinatorial configurations, designs, codes, graphs
Combinatorial configurations, designs, codes, graphs
Applications of combinatorial designs in computer science
ACM Computing Surveys (CSUR)
The combinatorics of authentication and secrecy codes
Journal of Cryptology
Key-minimal cryptosystems for unconditional secrecy
Journal of Cryptology
Some perpendicular arrays for arbitrarily large t
Discrete Mathematics
Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
Designs and their codes
Combinatorial characterizations of authentication codes
Designs, Codes and Cryptography
Codes and combinatorial designs
Proceedings of the Marshall Hall conference on Coding theory, design theory, group theory
Combinatorial designs and cryptography
Surveys in combinatorics, 1993
Universal hashing and authentication codes
Designs, Codes and Cryptography
On the construction of authentication and secrecy codes
Designs, Codes and Cryptography
Combinatorial Characterizations of Authentication Codes II
Designs, Codes and Cryptography
Designs, Codes and Cryptography - Special issue containing papers presented at the Second Upper Michigan Combinatorics Workshop on Designs, Codes and Geometries
Finite geometries
Steiner systems S(5,6,v) with v = 72 and 84
Mathematics of Computation
Combinatorial theory (2nd ed.)
Combinatorial theory (2nd ed.)
Further results on asymmetric authentication schemes
Information and Computation
Multireceiver authentication code4: models, bounds, constructions, and extensions
Information and Computation
A Steiner 5-Design on 36 Points
Designs, Codes and Cryptography - Special issue on designs and codes—a memorial tribute to Ed Assmus
Combinatorial Classification of Optimal AuthenticationCodes with Arbitration
Designs, Codes and Cryptography
Bounds and Combinatorial Structure of (k,n)Multi-Receiver A-Codes
Designs, Codes and Cryptography
Classification of flag-transitive Steiner quadruple systems
Journal of Combinatorial Theory Series A
Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels
Designs, Codes and Cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Designs, Graphs, Codes, and Their Links
Designs, Graphs, Codes, and Their Links
Combinatorial Bounds on Authentication Codes with Arbitration
Designs, Codes and Cryptography
New Bound on Authentication Code with Arbitration
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Authentication Codes: an Area where Coding and Cryptology Meet
Proceedings of the 5th IMA Conference on Cryptography and Coding
Combinatorial Designs: Constructions and Analysis
Combinatorial Designs: Constructions and Analysis
Three Constructions of Authentication Codes with Perfect Secrecy
Designs, Codes and Cryptography
Combinatorial Constructions for Optimal Splitting Authentication Codes
SIAM Journal on Discrete Mathematics
Optimum Secret Sharing Scheme Secure against Cheating
SIAM Journal on Discrete Mathematics
Perspectives for cryptographic long-term security
Communications of the ACM - Privacy and security in highly dynamic systems
GOB designs for authentication codes with arbitration
Designs, Codes and Cryptography
Foundations of cryptography: a primer
Foundations and Trends® in Theoretical Computer Science
Combinatorial characterizations of one-coincidence frequency-hopping sequences
Designs, Codes and Cryptography
Some constructions of systematic authentication codes using galois rings
Designs, Codes and Cryptography
Classification Algorithms for Codes and Designs (Algorithms and Computation in Mathematics)
Classification Algorithms for Codes and Designs (Algorithms and Computation in Mathematics)
Handbook of Combinatorial Designs, Second Edition (Discrete Mathematics and Its Applications)
Handbook of Combinatorial Designs, Second Edition (Discrete Mathematics and Its Applications)
Authentication Codes and Combinatorial Designs (Discrete Mathematics and Its Applications)
Authentication Codes and Combinatorial Designs (Discrete Mathematics and Its Applications)
Further combinatorial constructions for optimal frequency-hopping sequences
Journal of Combinatorial Theory Series A - Special issue in honor of Jacobus H. van Lint
The Steiner quadruple systems of order 16
Journal of Combinatorial Theory Series A - Special issue in honor of Jacobus H. van Lint
Combinatorial characterizations of authentication codes in verification oracle model
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
The classification of flag-transitive Steiner 4-designs
Journal of Algebraic Combinatorics: An International Journal
A census of highly symmetric combinatorial designs
Journal of Algebraic Combinatorics: An International Journal
ACM Transactions on Information and System Security (TISSEC)
Post Quantum Cryptography
A density-based greedy algorithm for higher strength covering arrays
Software Testing, Verification & Reliability
Information Theoretic Security
Foundations and Trends in Communications and Information Theory
Note: On the Cameron--Praeger conjecture
Journal of Combinatorial Theory Series A
Optimal frequency hopping sequences: auto- and cross-correlation properties
IEEE Transactions on Information Theory
Authentication and secrecy codes for equiprobable source probability distributions
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Optimal (k, n) visual cryptographic schemes for general k
Designs, Codes and Cryptography
Block-transitive designs in affine spaces
Designs, Codes and Cryptography
Message authentication with arbitration of transmitter/receiver disputes
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Notes: Almost simple groups with socle Ln(q) acting on Steiner quadruple systems
Journal of Combinatorial Theory Series A
Foundations of Software Testing
Foundations of Software Testing
Combinatorial bounds and characterizations of splitting authentication codes
Cryptography and Communications
Constructions of authentication codes from algebraic curves over finite fields
IEEE Transactions on Information Theory
Authentication theory and hypothesis testing
IEEE Transactions on Information Theory
Low-density parity-check codes based on finite geometries: a rediscovery and new results
IEEE Transactions on Information Theory
Combinatorial constructions of low-density parity-check codes for iterative decoding
IEEE Transactions on Information Theory
Construction of low-density parity-check codes based on balanced incomplete block designs
IEEE Transactions on Information Theory
Permutation arrays for powerline communication and mutually orthogonal latin squares
IEEE Transactions on Information Theory
Optimal frequency hopping sequences: a combinatorial approach
IEEE Transactions on Information Theory
Power line communications: state of the art and future trends
IEEE Communications Magazine
Computational complexity of reconstruction and isomorphism testing for designs and line graphs
Journal of Combinatorial Theory Series A
Hi-index | 0.00 |
Combinatorial design theory is a very active area of mathematical research, with many applications in communications and information theory, computer science, statistics, engineering, and life sciences. As one of the fundamental discrete structures, combinatorial designs are used in fields as diverse as error-correcting codes, statistical design of experiments, cryptography and information security, mobile and wireless communications, group testing algorithms in DNA screening, software and hardware testing, and interconnection networks. This monograph provides a tutorial on combinatorial designs, which gives an overview of the theory. Furthermore, the application of combinatorial designs to authentication and secrecy codes is described in depth. This close relationship of designs with cryptography and information security was first revealed in Shannon's seminal paper on secrecy systems. We bring together in one source foundational and current contributions concerning design-theoretic constructions and characterizations of authentication and secrecy codes.