Three constructions of authentication/secrecy codes
From MaRDI portal
Recommendations
- scientific article; zbMATH DE number 1982612
- Three constructions of authentication codes with perfect secrecy
- Three constructions of authentication codes from power function over finite fields with perfect secrecy.
- scientific article; zbMATH DE number 2127882
- scientific article; zbMATH DE number 4070794
Cites work
- scientific article; zbMATH DE number 4070794 (Why is no real title available?)
- scientific article; zbMATH DE number 1229730 (Why is no real title available?)
- scientific article; zbMATH DE number 503361 (Why is no real title available?)
- scientific article; zbMATH DE number 1088920 (Why is no real title available?)
- A construction for authentication/secrecy codes from 3-homogeneous permutation groups
- A construction for authentication/secrecy codes from certain combinatorial designs
- A lower bound on authentication after having observed a sequence of messages
- A shift register construction of unconditionally secure authentication codes
- Authentication Theory/Coding Theory
- Bounds and characterizations of authentication/secrecy schemes
- Codes Which Detect Deception
- Combinatorial characterizations of authentication codes. II
- Highly nonlinear mappings
- Information-theoretic bounds for authentication codes and block designs
- The Combinatorics of Perfect Authentication Schemes
- Three constructions of authentication codes with perfect secrecy
Cited in
(14)- On the relationships between perfect nonlinear functions and universal hash families
- Коды аутентификации с секретностью (обзор)
- Three constructions of authentication codes from power function over finite fields with perfect secrecy.
- Three constructions of authentication codes with perfect secrecy
- A construction for optimal \(c\)-splitting authentication and secrecy codes
- On the construction of authentication and secrecy codes
- Systematic authentication codes using additive polynomials
- Power trace functions over finite fields
- scientific article; zbMATH DE number 1982612 (Why is no real title available?)
- A coding theory construction of new systematic authentication codes
- A construction for authentication/secrecy codes from 3-homogeneous permutation groups
- Invariants of trace forms in odd characteristic and authentication codes
- A class of authentication codes with secrecy
- scientific article; zbMATH DE number 2127882 (Why is no real title available?)
This page was built for publication: Three constructions of authentication/secrecy codes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1770530)