Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
The combinatorics of authentication and secrecy codes
Journal of Cryptology
Multi-receiver/multi-sender network security: efficient authenticated multicast/feedback
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
Combinatorial characterizations of authentication codes
Designs, Codes and Cryptography
A new construction of circulant GH(p2;Zp)
Discrete Mathematics
Differentially uniform mappings for cryptography
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On almost perfect nonlinear permutations
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Combinatorial Characterizations of Authentication Codes II
Designs, Codes and Cryptography
Finite fields
Planar Functions and Planes of Lenz-Barlotti Class II
Designs, Codes and Cryptography
Universal Hashing and Geometric Codes
Designs, Codes and Cryptography
Almost perfect nonlinear power functions on GF (2n): the Niho case
Information and Computation
Multireceiver authentication code4: models, bounds, constructions, and extensions
Information and Computation
Hyperplane Sections of Fermat Varieties in P3 in Char.2 and Some Applications to Cyclic Codes
AAECC-10 Proceedings of the 10th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Characterisation of (k, n) Multi-receiver Authentication
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
New families of almost perfect nonlinear power mappings
IEEE Transactions on Information Theory
Almost perfect nonlinear power functions on GF(2n): the Welch case
IEEE Transactions on Information Theory
Constructions of authentication codes from algebraic curves over finite fields
IEEE Transactions on Information Theory
Logarithm Cartesian authentication codes
Information and Computation
Three Constructions of Authentication Codes with Perfect Secrecy
Designs, Codes and Cryptography
A coding theory construction of new systematic authentication codes
Theoretical Computer Science - Insightful theory
Authentication Schemes from Highly Nonlinear Functions
Designs, Codes and Cryptography
Authentication codes and bipartite graphs
European Journal of Combinatorics
Optimal authentication codes from difference balanced functions
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
On the relationships between perfect nonlinear functions and universal hash families
Theoretical Computer Science
Hi-index | 5.23 |
In this paper, we present several classes of authentication codes using functions with perfect nonlinearity and optimum nonlinearity. Some of the authentication codes are optimal. On the other hand, these authentication codes are easy to implement due to their simple algebraic structures.