Some constructions for authentication-secrecy codes
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Applications of combinatorial designs in computer science
ACM Computing Surveys (CSUR)
Bounds and constructions for authentication-secrecy codes with splitting
CRYPTO '88 Proceedings on Advances in cryptology
Optimal authentication systems
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Combinatorial Characterizations of Authentication Codes II
Designs, Codes and Cryptography
Authentication Codes in Plaintext and Chosen-Content Attacks
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Bounds and Combinatorial Structure of (k,n)Multi-Receiver A-Codes
Designs, Codes and Cryptography
Combinatorial Bounds on Authentication Codes with Arbitration
Designs, Codes and Cryptography
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Combinatorial Characterizations of Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Universal Hashing and Authentication Codes
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Codes for Interactive Authentication
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Combinatorial characterizations of authentication codes in verification oracle model
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Combinatorial bounds for authentication codes with arbitration
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Unconditionally secure information authentication in presence of erasures
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Hi-index | 0.01 |