The combinatorics of authentication and secrecy codes

106Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper is a study of the combinatorics of unconditionally secure secrecy and authentication codes, under the assumption that each encoding rule is to be used for the transmission of some number L of successive messages. We obtain bounds on the number of encoding rules required in order to obtain maximum levels of security. Some constructions are also given for codes which have the minimum number of encoding rules. These constructions use various types of combinatorial designs. © 1990 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Stinson, D. R. (1990). The combinatorics of authentication and secrecy codes. Journal of Cryptology, 2(1), 23–49. https://doi.org/10.1007/BF02252868

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free