The combinatorics of authentication and secrecy codes

103Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper is a study of the combinatorics of unconditionally secure secrecy and authentication codes, under the assumption that each encoding rule is to be used for the transmission of some number L of successive messages. We obtain bounds on the number of encoding rules required in order to obtain maximum levels of security. Some constructions are also given for codes which have the minimum number of encoding rules. These constructions use various types of combinatorial designs. © 1990 International Association for Cryptologic Research.

References Powered by Scopus

A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

12387Citations
N/AReaders
Get full text

Communication Theory of Secrecy Systems

7168Citations
N/AReaders
Get full text

Cipher Printing Telegraph Systems: For Secret Wire and Radio Telegraphic Communications

314Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Universal hashing and authentication codes

183Citations
N/AReaders
Get full text

Security in quantum cryptography

166Citations
N/AReaders
Get full text

Cryptographic hash functions

104Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Stinson, D. R. (1990). The combinatorics of authentication and secrecy codes. Journal of Cryptology, 2(1), 23–49. https://doi.org/10.1007/BF02252868

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 22

69%

Professor / Associate Prof. 4

13%

Lecturer / Post doc 3

9%

Researcher 3

9%

Readers' Discipline

Tooltip

Computer Science 25

78%

Engineering 3

9%

Mathematics 3

9%

Design 1

3%

Save time finding and organizing research with Mendeley

Sign up for free