Abstract
Two constructions of cartesian authentication codes from unitary geometry are given in this paper. Their size parameters and their probabilities of successful impersonation attack and successful substitution attack are computed. They are optimal under some cases.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have