期刊文献+

一类Cartesian认证码的构造 被引量:2

A construction method of Cartesian authentication codes
下载PDF
导出
摘要 利用有限域上特殊线性群的BN对分解,构造了一类Cartesian认证码,计算了其参数,并且计算了在给定译码规则下一致分布的成功的模仿攻击概率Pl和替换攻击概率PS. Authentication codes play an important role in modern communication.Authentication means that the receiver can identify the information,which is an essential technology avoiding the attack of others.A construction method of Cartesian authentication codes is presented and the parameters are computed.Moreover,assuming that the encoding rules are chosen,Pl and PS,which denote the largest uniformly distributed probability of a successful impersonation attack of these codes and of a successful substitution attack respectively,are also computed.
出处 《东北师大学报(自然科学版)》 CAS CSCD 北大核心 2009年第1期13-16,共4页 Journal of Northeast Normal University(Natural Science Edition)
基金 教育部博士点基金项目(20030183056)
关键词 CARTESIAN认证码 特殊线性群 标准形 authentication Codes SLn(Fq) standard form
  • 相关文献

参考文献6

  • 1GILBERT E N,MACWILLAMS F J, SLOANE J A. Codes which detect deception [J]. Bell System Technical Journal, 1974, 53,405-424.
  • 2HUNGORFORO T W. Algebra[M ]. New York: Springer-Verlag, 1974 : 20-63.
  • 3KENNETH S. Brown Building[M]. New York: Springer-Verlag, 1989 : 126-170.
  • 4万哲先.有限几何与平衡不完全区组设计[M].北京:科学出版社,1966:16-44.
  • 5吕恒,陈贵云.一类特殊的有限p-群[J].东北师大学报(自然科学版),2007,39(2):19-21. 被引量:2
  • 6付治国,陈殿友.利用一般线性群的BN对分解构造一类Cartesian认证码[J].吉林大学学报(理学版),2006,44(4):551-554. 被引量:1

二级参考文献13

  • 1赵友蕙.构作正交空间中的一类Cartesian认证码[J].数学的实践与认识,2005,35(8):188-193. 被引量:2
  • 2张敏.具有幂中心值的交换子的零化子[J].东北师大学报(自然科学版),2005,37(3):17-19. 被引量:2
  • 3WAN Zhe-xian.Further Construction of Cartesian Authentication Codes from Symplectic Geometry[J].Northeastern Math J,1992,8(1):4-20.
  • 4Hungorford T W.Algebra[M].New York:Springer-Verlag,1974.
  • 5Brown Kenneth S.Building[M].New York:Springer-Verlag,1989.
  • 6YAKOV BERKOVICH.Finite p-groups with few minimal nonabelian subgroups[J].Journal of Algebra,2006,297:62-100.
  • 7ROBINSION D J S.A course in the theory of groups[M].New York:Springer-Verlag,1982.
  • 8GEINEKEN H.Engelsche elemente der lange drei illinois[J].J Math,1961,5:681-707.
  • 9BACHMUTH S,MOCHIZUHI H Y,WALKUP D.A nonsolvable group of exponent 5[J].Bull Amer Math Soc,1970,76:638-640.
  • 10ROBINSION D J S.Finiteness condition and generalized soluble groups Ⅱ[M].New York:Springer-Verlag,1972:123-125.

共引文献1

同被引文献17

  • 1赵辉芳,秦德生.Using Normal Form of Nilpotent Matrices over Finite Fields to Construct Cartesian Authentication Codes[J].Northeastern Mathematical Journal,2004,20(4):415-423. 被引量:5
  • 2张胜,徐国爱,胡正名,杨义先,周锡增.基于身份公钥的移动IP认证方案[J].北京邮电大学学报,2005,28(3):86-88. 被引量:3
  • 3李殿龙,骆吉洲.基于2-Jordan型幂零阵的Cartesian认证码的构造[J].数学的实践与认识,2005,35(5):104-109. 被引量:5
  • 4William Stallings, Lawrie Brown. 计算机安全(原理与实践)[M].北京:机械工业出版社,2008:448-458.
  • 5CHARLES M,KOZIEROK,陈鸣,贾永兴,宋丽华,译.TCP/IP指南[M].北京:人民邮电出版社,2008.336-356.
  • 6ARUNA SENEVIRATNE, SARIKAYA. Cellular networks and mobilenext term internet[J].Computer Communications. 1998,21 (14) : 1244-1255.
  • 7K YEONG HUR, DOO-SEOP EOM, YEON-WOO LEE, ed al. Priority forwarding for improving the TCP performance in mobile IP based networks with packet buffering[J]. Computer Communications. 2007,30(6) ~1337-1349.
  • 8JANISE MCNAIR,TUNA TUGEU,WENYE WANG,ed al. A survey of cross-layer performance enhancements for Mobile IP networks[J].Computer Networks,2005,49(2): 119-146.
  • 9BRUCE SCHNEIER,吴世忠,祝世雄,张文政,译.应用密码学--协议、算法与C源程序[M].北京:机械工业出版社,2007.2-7.
  • 10William Stallings.密码编码学与网络安全--原理与实践[M].北京:电子工业出版社,2004.

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部