Article ID Journal Published Year Pages File Type
9497208 Journal of Pure and Applied Algebra 2005 20 Pages PDF
Abstract
In this paper, we present three algebraic constructions of authentication codes with secrecy. The codes have simple algebraic structures and are easy to implement. They are asymptotically optimal with respect to certain bounds.
Keywords
Related Topics
Physical Sciences and Engineering Mathematics Algebra and Number Theory
Authors
, , , ,