期刊文献+

Using involutory and idempotent matrices over finite fields to construct cartesian authentication codes 被引量:4

Using involutory and idempotent matrices over finite fields toconstruct cartesian authentication codes
下载PDF
导出
摘要 Two constructions of Cartesian authentication codes form involutory and idempotent matrices over finitefields are presented and their size Parameters are computed. Moreover, assume that the encoding rules are chosen ac-cording to a uniform Probablity distribution, the PI and Ps which dend the largest Probablities of a successful impersonation attack and a successful substitution attack respectively of these codes are also computed. Finially, it is Provedthat thase two Cartesian authentication codes are isomorphic. Two constructions of Cartesian authentication codes form involutory and idempotent matrices over finitefields are presented and their size Parameters are computed. Moreover, assume that the encoding rules are chosen ac-cording to a uniform Probablity distribution, the PI and Ps which dend the largest Probablities of a successful impersonation attack and a successful substitution attack respectively of these codes are also computed. Finially, it is Provedthat thase two Cartesian authentication codes are isomorphic.
作者 游宏 郑宝东
出处 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 1999年第3期18-21,共4页 哈尔滨工业大学学报(英文版)
关键词 AUTHENTICATION involutory IDEMPOTENT authentication,involutory,idempotent
  • 相关文献

同被引文献8

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部