research
∙
04/22/2021
Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes
A splitting BIBD is a type of combinatorial design that can be used to c...
research
∙
10/12/2019
On the equivalence of authentication codes and robust (2,2)-threshold schemes
In this paper, we show a "direct" equivalence between certain authentica...
research
∙
09/21/2018