170 research outputs found

    All binary, (n,e,r)-uniformly packed codes are known

    Get PDF

    Uniformly packed codes

    Get PDF

    A proof of the nonexistence of a binary (55,7,26) code

    Get PDF

    Gelijkmatig verdeelde codes

    Get PDF

    Authentication codes from ε-ASU hash functions with partially secret keys

    Get PDF
    An authentication code can be constructed with a family of e-Almost strong universal (e-ASU) hash functions, with the index of hash functions as the authentication key. This paper considers the performance of authentication codes from e-ASU, when the authentication key is only partially secret. We show how to apply the result to privacy amplification against active attacks in the scenario of two independent partially secret strings shared between a sender and a receiver. Keywords: Authentication code; Information theory; Privacy amplification; Unconditional securit

    Een beschrijving en analyse van IDEA

    Get PDF

    Two-dimensional burst identification codes and their use in burst correction

    Full text link

    Shannon's model

    No full text
    • …
    corecore