The authentication codes resistant to messages imitation and substitution are investigated. The case when the probabilities of imitation and substitution reach the lower limits has been highlighted. Such authentication codes are called optimal. We study constructions of optimal authentication codes based on orthogonal tables. The case of optimal authentication codes with optional uniform distribution on the set of keys is studied
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
(Communicated by Iwan Duursma) Abstract. We consider the problem of constructing optimal authenticat...
In both open and private communication the participants face potential threats from a malicious enem...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
For any authentication code for k source states and v messages having minimum possible deception pro...
AbstractIn this paper, a characterization of authentication codes in terms of bipartite graphs is gi...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
Abstract—We establish a construction of optimal authentica-tion codes achieving perfect multi-fold s...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
This paper derives some further results on unconditionally secure asymmetric authentication schemes....
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
(Communicated by Iwan Duursma) Abstract. We consider the problem of constructing optimal authenticat...
In both open and private communication the participants face potential threats from a malicious enem...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
For any authentication code for k source states and v messages having minimum possible deception pro...
AbstractIn this paper, a characterization of authentication codes in terms of bipartite graphs is gi...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
Abstract—We establish a construction of optimal authentica-tion codes achieving perfect multi-fold s...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
This paper derives some further results on unconditionally secure asymmetric authentication schemes....
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
(Communicated by Iwan Duursma) Abstract. We consider the problem of constructing optimal authenticat...
In both open and private communication the participants face potential threats from a malicious enem...