Abstract
In this paper, we present three algebraic constructions of authentication codes with secrecy. The codes have simple algebraic structures and are easy to implement. They are asymptotically optimal with respect to certain bounds. © Springer-Verlag Berlin Heidelberg 2003.
| Original language | English |
|---|---|
| Journal | J. of Pure and Applied Algebra |
| Publication status | Published - 2005 |