W.Ogata等[1]定义了两种新的组合设计:外差族(EDF)与外平衡不完全区组设计(EB IBD).本文首先用有限域中的分圆类给出EDF的一个构造;接着用EB IBD构造出具有完善保密性的最优分裂A-码,然后证明了由满足一定条件的两个EB IBD通过上述方法构造出的两个认证码是同构的.W.Ogata et al.[1] define two new types of combinatorial designs,which are called External difference family(EDF) and External balanced incomplete block design(EBIBD).The paper presents a construction to EDF by cyclotomic fields.Then we construct an optimal splitting authentication code with perfect secrecy by using EBIBD,and prove that the authentication codes constructed by two special EBIBD are isomorphism
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
Chen and Cheng (Ann. Statist. 27 (1999) 1948) got the relationships between a blocked symmetrical fa...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
1 Abstract. This paper introduces three new types of combinatorial designs,which we call external di...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
AbstractThis paper introduces three new types of combinatorial designs, which we call external diffe...
AbstractIn the theory of communication, both coding and cryptology play an important role. They are ...
External difference families (EDFs) are a type of new combinatorial designs originated from cryptogr...
A splitting BIBD is a type of combinatorial design that can be used to construct splitting authenti...
For any authentication code for k source states and v messages having minimum possible deception pro...
Kombinatorik yapıların birçok uygulama alanları vardır. Bunların en önemlilerinden biri kodlama teor...
研究了密码中的拟完美序列和完美序列与循环差集的关系,用群表示论证明了三族循环差集的存在;进而构造出相应的拟完美序列.猜想不存在周期大于4的完美序列.国家自然科学基金031-51
Combinatorial characterization of optimal authentication codes with arbitration was previously given...
This paper provides new combinatorial bounds and characterizations of authentication codes (A-codes)...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
Chen and Cheng (Ann. Statist. 27 (1999) 1948) got the relationships between a blocked symmetrical fa...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
1 Abstract. This paper introduces three new types of combinatorial designs,which we call external di...
In this paper, we give several kinds of characterisations of isomorphic authentication codes by exam...
AbstractThis paper introduces three new types of combinatorial designs, which we call external diffe...
AbstractIn the theory of communication, both coding and cryptology play an important role. They are ...
External difference families (EDFs) are a type of new combinatorial designs originated from cryptogr...
A splitting BIBD is a type of combinatorial design that can be used to construct splitting authenti...
For any authentication code for k source states and v messages having minimum possible deception pro...
Kombinatorik yapıların birçok uygulama alanları vardır. Bunların en önemlilerinden biri kodlama teor...
研究了密码中的拟完美序列和完美序列与循环差集的关系,用群表示论证明了三族循环差集的存在;进而构造出相应的拟完美序列.猜想不存在周期大于4的完美序列.国家自然科学基金031-51
Combinatorial characterization of optimal authentication codes with arbitration was previously given...
This paper provides new combinatorial bounds and characterizations of authentication codes (A-codes)...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
Chen and Cheng (Ann. Statist. 27 (1999) 1948) got the relationships between a blocked symmetrical fa...