Lecture Notes in Computer Science vol:1746 pages:25-34
Cryptography and Coding, 7th IMA International Conference date:December 20-22, 1999
Recent years have seen numerous examples where designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing schemes, correlation-immune and resilient functions. In this paper we give applications of some methods and results from the design theory, especially bounding the optimal size of the designs and codes, to cryptography. We give a new bound for the parameter t, when (n,T,t)-resilient functions and correlation-immune functions of order t exist. In the last section we present analogous bound for the parameter N of T-wise independent t-resilient function.