AbstractThere are several approaches to the construction of authentication codes without secrecy using error correcting codes. In this paper, we describe one approach and construct several classes of authentication codes using several types of error correcting codes. Some of the authentication codes constructed here are asymptotically optimal, and some are optimal
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
In both open and private communication the participants face potential threats from a malicious enem...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
This paper derives some further results on unconditionally secure asymmetric authentication schemes....
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
The purpose of an authentication code is La give proof that a message is authentic, i.e. it was not ...
The purpose of an authentication code is La give proof that a message is authentic, i.e. it was not ...
One of the main problems we want to address is the fact that in the construction theory of authentic...
One of the main problems we want to address is the fact that in the construction theory of authentic...
The purpose of an authentication code is La give proof that a message is authentic, i.e. it was not ...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
In both open and private communication the participants face potential threats from a malicious enem...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
AbstractThis paper derives some further results on unconditionally secure asymmetric authentication ...
This paper derives some further results on unconditionally secure asymmetric authentication schemes....
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
The purpose of an authentication code is La give proof that a message is authentic, i.e. it was not ...
The purpose of an authentication code is La give proof that a message is authentic, i.e. it was not ...
One of the main problems we want to address is the fact that in the construction theory of authentic...
One of the main problems we want to address is the fact that in the construction theory of authentic...
The purpose of an authentication code is La give proof that a message is authentic, i.e. it was not ...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
In both open and private communication the participants face potential threats from a malicious enem...