Bounds and Constructions for Authentication-Secrecy Codes with Splitting.
Marijke De SoetePublished in: CRYPTO (1988)
Keyphrases
- key distribution
- security analysis
- upper bound
- lower bound
- key management
- error correction
- mutual authentication
- biometric authentication
- upper and lower bounds
- worst case
- lower and upper bounds
- user authentication
- error bounds
- authentication scheme
- error correcting codes
- identity authentication
- fragile watermarking
- spread spectrum
- security mechanisms
- security properties
- image authentication
- security requirements
- learning algorithm
- access control
- public key