Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
The combinatorics of authentication and secrecy codes
Journal of Cryptology
Coding and information theory
Algebraic-Geometric Codes
Universal Hashing and Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Authentication Codes in Plaintext and Chosen-Content Attacks
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Universal Hashing and Geometric Codes
Designs, Codes and Cryptography
Three Systems for Threshold Generation of Authenticators
Designs, Codes and Cryptography
Unconditionally Secure Group Authentication
Designs, Codes and Cryptography
Multiround Unconditionally Secure Authentication
Designs, Codes and Cryptography
On Families of Hash Functions via Geometric Codes and Concatenation
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
On the Construction of Perfect Authentication Codes that Permit Arbitration
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
LFSR-based Hashing and Authentication
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of the Gemmell and Naor Multiround Authentication Protocol
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
MDx-MAC and Building Fast MACs from Hash Functions
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Bounds and Constructions for Multireceiver Authentication Codes
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Bucket hashing with a small key size
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Secure multiround authentication protocols
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
A2-codes from universal hash classes
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Crypto topics and applications I
Algorithms and theory of computation handbook
Optimal authentication codes from difference balanced functions
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Unconditionally secure information authentication in presence of erasures
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Unconditionally-Secure robust secret sharing with compact shares
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Brief announcement: optimal amortized secret sharing with cheater identification
PODC '12 Proceedings of the 2012 ACM symposium on Principles of distributed computing
CHES'12 Proceedings of the 14th international conference on Cryptographic Hardware and Embedded Systems
A new multi-linear universal hash family
Designs, Codes and Cryptography
Hi-index | 0.00 |
In this paper we show an explicit relation between authentication codes and codes correcting independent errors. This relation gives rise to several upper bounds on A-codes. We also show how to construct A-codes starting from error correcting codes. The latter is used to show that if PS exceeds PI by an arbitrarily small positive amount, then the number of source states grows exponentially with the number of keys but if PS = PI it will grow only linearly.