In this paper, we give several kinds of characterisations of isomorphic authentication codes by examining a correspondence between optimal authentication codes and some combinatorial designs. The isomorphism classes of some kinds of authentication codes are also enumerated.X111sciescopu
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
One of the main problems we want to address is the fact that in the construction theory of authentic...
One of the main problems we want to address is the fact that in the construction theory of authentic...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
For any authentication code for k source states and v messages having minimum possible deception pro...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
W.Ogata等[1]定义了两种新的组合设计:外差族(EDF)与外平衡不完全区组设计(EB IBD).本文首先用有限域中的分圆类给出EDF的一个构造;接着用EB IBD构造出具有完善保密性的最优分裂A...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
AbstractIn this paper, a characterization of authentication codes in terms of bipartite graphs is gi...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
One of the main problems we want to address is the fact that in the construction theory of authentic...
One of the main problems we want to address is the fact that in the construction theory of authentic...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
For any authentication code for k source states and v messages having minimum possible deception pro...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
W.Ogata等[1]定义了两种新的组合设计:外差族(EDF)与外平衡不完全区组设计(EB IBD).本文首先用有限域中的分圆类给出EDF的一个构造;接着用EB IBD构造出具有完善保密性的最优分裂A...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
AbstractIn this paper, a characterization of authentication codes in terms of bipartite graphs is gi...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...