A splitting BIBD is a type of combinatorial design that can be used to construct splitting authentication codes with good properties. In this paper we show that a design-theoretic approach is useful in the analysis of more general splitting authentication codes. Motivated by the study of algebraic manipulation detection (AMD) codes, we define the concept of a {\em group generated} splitting authentication code. We show that all group-generated authentication codes have perfect secrecy, which allows us to demonstrate that algebraic manipulation detection codes can be considered to be a special case of an authentication code with perfect secrecy. We also investigate splitting BIBDs that can be ``equitably ordered''. These splitting ...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...
1 Abstract. This paper introduces three new types of combinatorial designs,which we call external di...
(Communicated by Iwan Duursma) Abstract. We consider the problem of constructing optimal authenticat...
AbstractThis paper introduces three new types of combinatorial designs, which we call external diffe...
(Communicated by Iwan Duursma) Abstract. We consider the problem of constructing optimal authenticat...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we construct codes which provide both secrecy and authentication using 3-homogeneous ...
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes....
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
AbstractIn this paper, a characterization of authentication codes in terms of bipartite graphs is gi...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...
1 Abstract. This paper introduces three new types of combinatorial designs,which we call external di...
(Communicated by Iwan Duursma) Abstract. We consider the problem of constructing optimal authenticat...
AbstractThis paper introduces three new types of combinatorial designs, which we call external diffe...
(Communicated by Iwan Duursma) Abstract. We consider the problem of constructing optimal authenticat...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we construct codes which provide both secrecy and authentication using 3-homogeneous ...
This paper provides a mathematical analysis of optimal algebraic manipulation detection (AMD) codes....
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
AbstractIn this paper, a characterization of authentication codes in terms of bipartite graphs is gi...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...
Algebraic manipulation detection (AMD) codes, introduced at EUROCRYPT 2008, may, in some sense, be v...