Login / Signup
An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities.
Juan Carlos Ku-Cauich
Guillermo Morales-Luna
Horacio Tapia-Recillas
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
security analysis
authentication protocol
smart card
probability distribution
worst case
data sets
source code
closed form
authentication scheme
security mechanisms
biometric authentication
user authentication
formal concept analysis
security requirements
optimal design
optimal strategy
low cost