Three constructions of authentication/secrecy codes

Cunsheng Ding, Arto Salomaa, Patrick Sole

Research output: Contribution to journalJournal Article

Abstract

In this paper, we present three algebraic constructions of authentication codes with secrecy. The codes have simple algebraic structures and are easy to implement. They are asymptotically optimal with respect to certain bounds. © Springer-Verlag Berlin Heidelberg 2003.
Original languageEnglish
JournalJ. of Pure and Applied Algebra
Publication statusPublished - 2005

Fingerprint

Dive into the research topics of 'Three constructions of authentication/secrecy codes'. Together they form a unique fingerprint.

Cite this