Three constructions of authentication/secrecy codes (Q1770530): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
Set profile property. |
||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank |
Revision as of 05:38, 5 March 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Three constructions of authentication/secrecy codes |
scientific article |
Statements
Three constructions of authentication/secrecy codes (English)
0 references
7 April 2005
0 references
The authors describe three algebraic construction codes with secrecy. The codes are asymptotically optimal against impersonation attacks and substitution attacks and are easy to implement since they have a simple algebraic structure.
0 references
secrecy codes
0 references
authentication
0 references
impersonation attack
0 references