Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10334376 | Theoretical Computer Science | 2005 | 19 Pages |
Abstract
There are several approaches to the construction of authentication codes without secrecy using error correcting codes. In this paper, we describe one approach and construct several classes of authentication codes using several types of error correcting codes. Some of the authentication codes constructed here are asymptotically optimal, and some are optimal.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
Cunsheng Ding, Xuesong Wang,