期刊文献+

Authentication-secrecy code based on conies over finite fields

Authentication-secrecy code based on conies over finite fields
原文传递
导出
摘要 An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given. An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system for cosets of a certain subgroup in the projective transformation group.A special case is studied,i.e.the rational normal curves are the conies over finite fields.The representation system for the cosets which determines the set of encoding rules will be given.
出处 《Science China(Technological Sciences)》 SCIE EI CAS 1996年第5期471-484,共14页 中国科学(技术科学英文版)
基金 Project supported by the National Natural Science Foundation of China and the Natural Science Foundation of Guangdong Province.
关键词 AUTHENTICATION CODE information-theoretic BOUND CONIC FINITE field. authentication code,information-theoretic bound,conic,finite field.
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部