Authentication Codes and Combinatorial Designs

Authentication Codes and Combinatorial Designs
ISBN-10
1420003186
ISBN-13
9781420003185
Category
Computers
Pages
256
Language
English
Published
2006-01-13
Publisher
CRC Press
Author
Dingyi Pei

Description

Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems. Authentication Codes and Combinatorial Designs presents new findings and original work on perfect authentication codes characterized in terms of combinatorial designs, namely strong partially

Similar books

  • Combinatorial Designs for Authentication and Secrecy Codes
    By Michael Huber

    [14, 177]): Is it possible to give combinatorial characterizations as well as constructions of optimal codes (with and without secrecy requirements)? We study authentication codes with splitting in this section. In such a code, ...

  • Combinatorial Designs: Constructions and Analysis
    By Douglas Stinson

    Created to teach students many of the most important techniques used for constructing combinatorial designs, this is an ideal textbook for advanced undergraduate and graduate courses in combinatorial design theory.

  • CRC Handbook of Combinatorial Designs
    By Charles J. Colbourn

    Authentication without Secrecy The three participants are again Alice , Bob , and Oscar . Suppose that Oscar has the ability to introduce his own messages into the channel and / or to modify existing messages .

  • Handbook of Combinatorial Designs
    By Charles J. Colbourn, Jeffrey H. Dinitz

    Williamson - type matrices if they are pairwise amicable ( see $ 2.1 ) , or 3. Goethals - Seidel type matrices if they are type I. 1.37 Construction Replacing variables of W ( from Examples 1.33 ) with Williamson matrices A , B , C , D ...

  • Introduction to Combinatorial Designs, Second Edition
    By W.D. Wallis

    Focusing on a major part of this subject, Introduction to Combinatorial Designs, Second Edition provides a solid foundation in the classical areas of design theory as well as in more contemporary designs based on applications in a variety ...

  • Coding, Cryptography and Combinatorics
    By Harald Niederreiter, Chaoping Xing, Keqin Feng

    Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume.

  • Surveys in Combinatorics, 1993
    By K. Walker

    Authentication codes with splitting The term splitting refers to the situation where there can be more than one ... In the case of authentication without secrecy, it can be shown that Pd, Z 1/ [Al for 0 3 i 3 t (see, for example, [63]).

  • Selected Topics in Information and Coding Theory
    By Isaac Woungang

    Distributed joint source-channel coding on a multiple access channel / Vinod Sharma and R. Rajesh -- pt. 4. Other selected topics in information and coding theory. ch. 11.

  • Topics in Geometry, Coding Theory and Cryptography
    By Henning Stichtenoth, Arnaldo Garcia

    This book presents survey articles on some of these new developments. The topics focus on material which has not yet been presented in other books or survey articles.

  • Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach
    By Behrouz Zolfaghari, Khodakhast Bibak

    ... Codes Cryptogr. 58(1), 73–88 (2011) 424. D. Crnkovic, A series of regular Hadamard matrices. Designs Codes Cryptogr. 39(2), 247– 251 (2006) 425. Y.J. Ionin, Regular Hadamard matrices generating infinite families of symmetric designs.