Authentication Codes and Combinatorial Designs: Discrete Mathematics and Its Applications
Autor Dingyi Peien Limba Engleză Hardback – 13 ian 2006
Beginning with examples illustrating the concepts of authentication schemes and combinatorial designs, the book considers the probability of successful deceptions followed by schemes involving three and four participants, respectively. From this point, the author constructs the perfect authentication schemes and explores encoding rules for such schemes in some special cases.
Using rational normal curves in projective spaces over finite fields, the author constructs a new family of SPBD. He then presents some established combinatorial designs that can be used to construct perfect schemes, such as t-designs, orthogonal arrays of index unity, and designs constructed by finite geometry. The book concludes by studying definitions of perfect secrecy, properties of perfectly secure schemes, and constructions of perfect secrecy schemes with and without authentication.
Supplying an appendix of construction schemes for authentication and secrecy schemes, Authentication Codes and Combinatorial Designs points to new applications of combinatorial designs in cryptography.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (1) | 389.63 lei 3-5 săpt. | |
| CRC Press – 5 sep 2019 | 389.63 lei 3-5 săpt. | |
| Hardback (1) | 756.45 lei 3-5 săpt. | |
| CRC Press – 13 ian 2006 | 756.45 lei 3-5 săpt. |
Din seria Discrete Mathematics and Its Applications
- 27%
Preț: 468.62 lei - 35%
Preț: 662.38 lei - 27%
Preț: 1314.65 lei - 28%
Preț: 1645.13 lei - 29%
Preț: 546.74 lei - 24%
Preț: 1361.95 lei - 28%
Preț: 601.38 lei - 26%
Preț: 383.37 lei - 34%
Preț: 1276.57 lei - 29%
Preț: 1398.64 lei - 35%
Preț: 1096.42 lei - 29%
Preț: 650.86 lei - 29%
Preț: 645.94 lei - 35%
Preț: 745.90 lei - 29%
Preț: 535.31 lei - 34%
Preț: 368.43 lei - 34%
Preț: 523.30 lei - 30%
Preț: 1271.29 lei - 24%
Preț: 1394.56 lei - 24%
Preț: 519.34 lei - 34%
Preț: 450.87 lei - 29%
Preț: 679.64 lei - 29%
Preț: 504.55 lei - 35%
Preț: 1264.47 lei - 29%
Preț: 1107.06 lei - 29%
Preț: 928.18 lei - 34%
Preț: 472.95 lei - 17%
Preț: 360.51 lei - 35%
Preț: 838.13 lei - 29%
Preț: 1005.42 lei - 35%
Preț: 1093.52 lei - 17%
Preț: 322.16 lei - 29%
Preț: 757.11 lei - 24%
Preț: 1394.19 lei - 29%
Preț: 589.73 lei - 29%
Preț: 672.43 lei - 34%
Preț: 726.13 lei - 29%
Preț: 531.27 lei - 24%
Preț: 1504.75 lei - 35%
Preț: 910.91 lei - 27%
Preț: 390.49 lei - 14%
Preț: 383.38 lei
Preț: 756.45 lei
Preț vechi: 1070.93 lei
-29%
Puncte Express: 1135
Preț estimativ în valută:
133.96€ • 156.45$ • 116.37£
133.96€ • 156.45$ • 116.37£
Carte disponibilă
Livrare economică 31 ianuarie-14 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781584884736
ISBN-10: 1584884738
Pagini: 256
Ilustrații: 50 b/w images and 3 tables
Dimensiuni: 156 x 234 x 20 mm
Greutate: 0.5 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Discrete Mathematics and Its Applications
ISBN-10: 1584884738
Pagini: 256
Ilustrații: 50 b/w images and 3 tables
Dimensiuni: 156 x 234 x 20 mm
Greutate: 0.5 kg
Ediția:1
Editura: CRC Press
Colecția Chapman and Hall/CRC
Seria Discrete Mathematics and Its Applications
Public țintă
Mathematicians in discrete mathematics, combinatorics, cryptography; computer scientists in cryptography and information security; and electrical engineers in communicationsCuprins
Introduction. Authentication Schemes. Authentication Schemes with Three Participants. Authentication Schemes with Arbitration. A-Codes Based on Rational Normal Curves. t-Deisgns. Orthogonal Arrays of Index Unity. A-Codes from Finite Geometries. Authentication/Secrecy Schemes. Appendix A: A Survey of Constructions for A-Codes. References. Notations. Index.
Descriere
A comprehensive and self-contained treatment of the subject, Authentication Codes and Combinatorial Designs covers optimal authentication codes, unconditionally secure authentication schemes, and both symmetric and asymmetric authentication codes. The book addresses an important area in cryptography, namely the authentication of codes. It ties together the notion of authentication codes and combinatorial designs and demonstrates how ideas from combinatorics can be used for cryptographic applications. The author proves the information-theoretic and combinatorial bounds and the conditions for achieving these bounds in simple, clean, and comprehensive language of mathematics.