Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
9497208 | Journal of Pure and Applied Algebra | 2005 | 20 Pages |
Abstract
In this paper, we present three algebraic constructions of authentication codes with secrecy. The codes have simple algebraic structures and are easy to implement. They are asymptotically optimal with respect to certain bounds.
Related Topics
Physical Sciences and Engineering
Mathematics
Algebra and Number Theory
Authors
Cunsheng Ding, Arto Salomaa, Patrick Solé, Xiaojian Tian,