AbstractIn this paper, we present several classes of authentication codes using functions with perfect nonlinearity and optimum nonlinearity. Some of the authentication codes are optimal. On the other hand, these authentication codes are easy to implement due to their simple algebraic structures
AbstractFunctions with high nonlinearity have important applications in cryptography, sequences and ...
For any authentication code for k source states and v messages having minimum possible deception pro...
VK: Kaisa Nyberg; Nyberg, K.; CRYPTOIn the late 1980s the importance of highly nonlinear functions i...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
Authentication is an important issue in many communications systems. Simmons developed the theory of...
AbstractChanson, Ding, and Salomaa have recently constructed several classes of authentication codes...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
We construct two families of authentication schemes using highly nonlinear functions on finite field...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
10.1109/ISIT.2006.261630IEEE International Symposium on Information Theory - Proceedings739-743PIST
Chanson, Ding and Salomaa have recently constructed several classes of authentication codes using ce...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In order to construct the border solutions for nonsupersingular elliptic curve equations, some commo...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
AbstractFunctions with high nonlinearity have important applications in cryptography, sequences and ...
For any authentication code for k source states and v messages having minimum possible deception pro...
VK: Kaisa Nyberg; Nyberg, K.; CRYPTOIn the late 1980s the importance of highly nonlinear functions i...
AbstractIn this paper, we present several classes of authentication codes using functions with perfe...
Authentication is an important issue in many communications systems. Simmons developed the theory of...
AbstractChanson, Ding, and Salomaa have recently constructed several classes of authentication codes...
Authentication codes have been developed since 1974, while error correcting codes have a longer hist...
We construct two families of authentication schemes using highly nonlinear functions on finite field...
The authentication codes resistant to messages imitation and substitution are investigated. The case...
10.1109/ISIT.2006.261630IEEE International Symposium on Information Theory - Proceedings739-743PIST
Chanson, Ding and Salomaa have recently constructed several classes of authentication codes using ce...
AbstractThere are several approaches to the construction of authentication codes without secrecy usi...
AbstractIn this paper, we present three algebraic constructions of authentication codes with secrecy...
In order to construct the border solutions for nonsupersingular elliptic curve equations, some commo...
AbstractIn the late 1980s the importance of highly nonlinear functions in cryptography was first dis...
AbstractFunctions with high nonlinearity have important applications in cryptography, sequences and ...
For any authentication code for k source states and v messages having minimum possible deception pro...
VK: Kaisa Nyberg; Nyberg, K.; CRYPTOIn the late 1980s the importance of highly nonlinear functions i...