Three constructions of authentication/secrecy codes (Q1770530): Difference between revisions
From MaRDI portal
Set profile property. |
Set OpenAlex properties. |
||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1016/j.jpaa.2004.08.008 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2017403270 / rank | |||
Normal rank |
Revision as of 22:52, 19 March 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Three constructions of authentication/secrecy codes |
scientific article |
Statements
Three constructions of authentication/secrecy codes (English)
0 references
7 April 2005
0 references
The authors describe three algebraic construction codes with secrecy. The codes are asymptotically optimal against impersonation attacks and substitution attacks and are easy to implement since they have a simple algebraic structure.
0 references
secrecy codes
0 references
authentication
0 references
impersonation attack
0 references