Authentication theory/coding theory
Proceedings of CRYPTO 84 on Advances in cryptology
Universal hashing and authentication codes
Designs, Codes and Cryptography
Exponential sums over Galois rings and their applications
FFA '95 Proceedings of the third international conference on Finite fields and applications
Cryptography: Theory and Practice
Cryptography: Theory and Practice
On Families of Hash Functions via Geometric Codes and Concatenation
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
A-Codes from Rational Functions over Galois Rings
Designs, Codes and Cryptography
Aperiodic and Odd Correlations of Some p-Ary Sequences from Galois Rings
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Improved bounds on weil sums over galois rings and homogeneous weights
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Gray isometries for finite chain rings and a nonlinear ternary (36, 312, 15) code
IEEE Transactions on Information Theory
Systematic authentication codes from highly nonlinear functions
IEEE Transactions on Information Theory
An upper bound for Weil exponential sums over Galois rings and applications
IEEE Transactions on Information Theory
Systematic authentication codes using additive polynomials
Designs, Codes and Cryptography
Combinatorial Designs for Authentication and Secrecy Codes
Foundations and Trends in Communications and Information Theory
Hi-index | 0.00 |
For q = p m and m 驴 1, we construct systematic authentication codes over finite field $$\mathbb{F}_{q}$$ using Galois rings. We give corrections of the construction of [2]. We generalize corresponding systematic authentication codes of [6] in various ways.