New Bounds and Constructions for Authentication/Secrecy Codes with Splitting.
Marijke De SoetePublished in: J. Cryptol. (1991)
Keyphrases
- key distribution
- security analysis
- upper bound
- mutual authentication
- lower bound
- upper and lower bounds
- error correction
- authentication scheme
- worst case
- digital images
- biometric authentication
- confidence bounds
- lower and upper bounds
- average case
- spread spectrum
- error correcting codes
- factor authentication
- fragile watermarking
- logical operations
- identity authentication
- image authentication
- security properties
- variance reduction
- digital watermarking
- key management
- security requirements
- privacy protection
- fault tolerant
- smart card