Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Information-theoretic bounds for authentication schemes
Journal of Cryptology
Key-minimal cryptosystems for unconditional secrecy
Journal of Cryptology
Some improved bounds on the information rate of perfect secret sharing schemes
Journal of Cryptology
The Combinatorics of Perfect Authentication Schemes
SIAM Journal on Discrete Mathematics
Communications of the ACM
How to (Really) Share a Secret
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Hi-index | 0.00 |
In this paper we use results on authentication schemes to derive alternative proofs for results on perfect local randomnes in pseudo-random sequences, on block cipher systems which afford perfect secrecy against known plaintext attacks and on secret sharing schemes.