Three constructions of authentication/secrecy codes (Q1770530): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
Set OpenAlex properties.
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.jpaa.2004.08.008 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2017403270 / rank
 
Normal rank

Revision as of 22:52, 19 March 2024

scientific article
Language Label Description Also known as
English
Three constructions of authentication/secrecy codes
scientific article

    Statements

    Three constructions of authentication/secrecy codes (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    7 April 2005
    0 references
    The authors describe three algebraic construction codes with secrecy. The codes are asymptotically optimal against impersonation attacks and substitution attacks and are easy to implement since they have a simple algebraic structure.
    0 references
    0 references
    0 references
    0 references
    0 references
    secrecy codes
    0 references
    authentication
    0 references
    impersonation attack
    0 references
    0 references