Login / Signup
Three Constructions of Authentication Codes from Power Function over Finite Fields with Perfect Secrecy.
Xiuli Wang
Shangdi Chen
Maoyuan Zhou
Published in:
Ars Comb. (2012)
Keyphrases
</>
security analysis
power consumption
key distribution
error correction
neural network
data sets
low cost
access control
lightweight
security requirements
user authentication
authentication scheme
error correcting codes