Some Applications of Bounds for Designs to the Cryptography
Author(s) -
⋆Svetla Nikova,
Ventsislav Nikov
Publication year - 1999
Publication title -
lecture notes in computer science
Language(s) - English
Resource type - Book series
SCImago Journal Rank - 0.249
H-Index - 400
eISSN - 1611-3349
pISSN - 0302-9743
DOI - 10.1007/3-540-46665-7_2
Subject(s) - computer science , cryptography , bounding overwatch , secrecy , upper and lower bounds , theoretical computer science , secret sharing , information theoretic security , boolean function , discrete mathematics , algorithm , mathematics , computer security , artificial intelligence , mathematical analysis
Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authen- tication codes, secret sharing schemes, correlation-immune and resilient functions. In this paper we give applications of some methods and results from the design theory, especially bounding the optimal size of the designs and codes, to cryptography. We give a new bound for the parameter t, when (n;T; t)-resilient function and correlation-immune function of order t exist. In the last section we present analogous bound for the parameter N of T-wise independent t-resilient function.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom