Design theory
Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Some constructions and bounds for authentication codes
Proceedings on Advances in cryptology---CRYPTO '86
A coordinatization of generalized quadrangles of order (s,s+2)
Journal of Combinatorial Theory Series A
Some constructions and bounds for authentication codes
Journal of Cryptology
A Natural Taxonomy for Digital Information Authentication Schemes
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Construction for Authentication/Secrecy Codes from Certain Combinatorial Designs
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Perfect and essentially perfect authentication schemes
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Bounds and constructions for authentication-secrecy codes with splitting
CRYPTO '88 Proceedings on Advances in cryptology
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Authentication codes that are r-fold secure against spoofing
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Bounds and Characterizations of Authentication/SecrecySchemes
Designs, Codes and Cryptography
Three Constructions of Authentication Codes with Perfect Secrecy
Designs, Codes and Cryptography
Authentication and secrecy codes for equiprobable source probability distributions
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Three constructions of authentication/secrecy codes
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Combinatorial Designs for Authentication and Secrecy Codes
Foundations and Trends in Communications and Information Theory
Combinatorial bounds and characterizations of splitting authentication codes
Cryptography and Communications
A class of authentication codes with secrecy
Designs, Codes and Cryptography
Symmetric authentication codes with secrecy and unconditionally secure authenticated encryption
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Hi-index | 0.00 |
We deal with authentication / secrecy codes having unconditional security. Besides some new results for a "spoofing attack of order L" we give several constructions using finite incidence structures (designs, generalized quadrangles).