Using additive polynomials related to some curves over finite fields, we construct two families of systematic authentication codes. We use tight bounds for the number of rational points of these curves in estimating the probabilities of the systematic authentication codes. We compare their parameters with some existing codes in the literature. We observe that the parameters are better than the existing ones in some cases
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
Multisender authentication codes allow a group of senders to construct an authenticated message for ...
For q = p(m) and m = 1, we construct systematic authentication codes over finite field F-q using Gal...
the date of receipt and acceptance should be inserted later Abstract We introduce four constructions...
In this thesis we study a class of authentication codes with secrecy. We obtain the maximum success ...
We describe an authentication scheme whose security is based on the hardness of finding roots of sys...
International audienceFinite fields play important roles in many application areas such as coding th...
We construct two families of authentication schemes using highly nonlinear functions on finite field...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
Multisender authentication codes allow a group of senders to construct an authenticated message for ...
The main goal of this work is to improve algebraic geometric/number theoretic constructions of error...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
Multisender authentication codes allow a group of senders to construct an authenticated message for ...
For q = p(m) and m = 1, we construct systematic authentication codes over finite field F-q using Gal...
the date of receipt and acceptance should be inserted later Abstract We introduce four constructions...
In this thesis we study a class of authentication codes with secrecy. We obtain the maximum success ...
We describe an authentication scheme whose security is based on the hardness of finding roots of sys...
International audienceFinite fields play important roles in many application areas such as coding th...
We construct two families of authentication schemes using highly nonlinear functions on finite field...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
In this paper, we present three algebraic constructions of authentication codes with secrecy. The co...
Multisender authentication codes allow a group of senders to construct an authenticated message for ...
The main goal of this work is to improve algebraic geometric/number theoretic constructions of error...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...
In this paper, a characterization of authentication codes in terms of bipartite graphs is given. By ...