cartesian authentication codes
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 0)

H-INDEX

5
(FIVE YEARS 0)

2018 ◽  
Vol 12 (3) ◽  
pp. 119-136 ◽  
Author(s):  
Wachirapong Jirakitpuwapat ◽  
Parin Chaipunya ◽  
Poom Kumam ◽  
Sompong Dhompongsa ◽  
Phatiphat Thounthong

Abstract In this paper, we construct some cartesian authentication codes from geometries over finite commutative rings. We only assume the uniform probability distribution over the set of encoding rules in order to be able to compute the probabilities of successful impersonation attack and substitution attack. Our methods are comfortable and secure for users, i.e., our encoding rules reduce the probabilities of successful impersonation attack and substitution attack.


2007 ◽  
Vol 53 (6) ◽  
pp. 2229-2235 ◽  
Author(s):  
Cunsheng Ding ◽  
T. Helleseth ◽  
T. Klove ◽  
Xuesong Wang

2003 ◽  
Vol 184 (1) ◽  
pp. 93-108 ◽  
Author(s):  
T.W. Sze ◽  
S. Chanson ◽  
C. Ding ◽  
T. Helleseth ◽  
M.G. Parker

Sign in / Sign up

Export Citation Format

Share Document