Article ID Journal Published Year Pages File Type
10334376 Theoretical Computer Science 2005 19 Pages PDF
Abstract
There are several approaches to the construction of authentication codes without secrecy using error correcting codes. In this paper, we describe one approach and construct several classes of authentication codes using several types of error correcting codes. Some of the authentication codes constructed here are asymptotically optimal, and some are optimal.
Related Topics
Physical Sciences and Engineering Computer Science Computational Theory and Mathematics
Authors
, ,