A2-codes and codes for the rank metric

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

Simmons (1990) has introduced an extended authentication model where caution is taken both against deceptions from an outsider (opponent) and against some forms of deception from the insiders (transmitter and receiver). Codes for this model are called authentication codes with arbitration, or simply A2 codes. A new construction of authentication codes with arbitration is proposed, which uses codes for the rank metric
Original languageEnglish
Title of host publication[Host publication title missing]
Pages492
DOIs
Publication statusPublished - 1994
EventIEEE International Symposium on Information Theory (ISIT), 1994 - Trondheim, Norway
Duration: 1994 Jun 271994 Jul 1

Conference

ConferenceIEEE International Symposium on Information Theory (ISIT), 1994
Country/TerritoryNorway
CityTrondheim
Period1994/06/271994/07/01

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Fingerprint

Dive into the research topics of 'A2-codes and codes for the rank metric'. Together they form a unique fingerprint.

Cite this