New combinatorial bounds for authentication codes and key predistribution schemes

被引:0
|
作者
机构
来源
Des Codes Cryptography | / 1卷 / 87-100期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] LOWER BOUNDS FOR AUTHENTICATION CODES WITH SPLITTING
    SGARRO, A
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 283 - 293
  • [42] Combinatorial and LP bounds for LRC codes
    Hu, Sihuang
    Tamo, Itzhak
    Barg, Alexander
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 1008 - 1012
  • [43] Linear authentication codes: Bounds and constructions
    Wang, HX
    Xing, CP
    Safavi-Naini, R
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (04) : 866 - 872
  • [44] Bounds and constructions for multireceiver authentication codes
    Safavi-Naini, R
    Wang, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 242 - 256
  • [45] SOME CONSTRUCTIONS AND BOUNDS FOR AUTHENTICATION CODES
    STINSON, DR
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 418 - 425
  • [46] Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution
    Zha, Xuan
    Ni, Wei
    Zheng, Kangfeng
    Liu, Ren Ping
    Niu, Xinxin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (10) : 2261 - 2275
  • [47] Homomorphic Linear Authentication Schemes from ε-Authentication Codes
    Han, Shuai
    Liu, Shengli
    Zhang, Fangguo
    Chen, Kefei
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 487 - 498
  • [48] Graph-theoretic design and analysis of key predistribution schemes
    Michelle Kendall
    Keith M. Martin
    Designs, Codes and Cryptography, 2016, 81 : 11 - 34
  • [49] Key predistribution schemes for sensor networks for continuous deployment scenario
    Uenlue, Abduelhakim
    Armagan, Oensel
    Levi, Albert
    Savas, Erkay
    Ercetin, Oergur
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 239 - +
  • [50] Graph-theoretic design and analysis of key predistribution schemes
    Kendall, Michelle
    Martin, Keith M.
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 81 (01) : 11 - 34