Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Combinatorial characterizations of authentication codes
Designs, Codes and Cryptography
On families of hash functions via geometric codes and concatenation
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Combinatorial Characterizations of Authentication Codes II
Designs, Codes and Cryptography
Finite fields
Universal Hashing and Geometric Codes
Designs, Codes and Cryptography
Cartesian authentication codes from functions with optimal nonlinearity
Theoretical Computer Science
On the cardinality of systematic authentication codes via error-correcting codes
IEEE Transactions on Information Theory
Constructions of authentication codes from algebraic curves over finite fields
IEEE Transactions on Information Theory
Linear authentication codes: bounds and constructions
IEEE Transactions on Information Theory
Unconditionally secure ring authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Optimal authentication codes from difference balanced functions
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Hi-index | 0.01 |
There are several approaches to the construction of authentication codes without secrecy using error correcting codes. In this paper, we describe one approach and construct several classes of authentication codes using several types of error correcting codes. Some of the authentication codes constructed here are asymptotically optimal, and some are optimal.