Acta Metallurgica Sinica(English letters) ›› 2015, Vol. 22 ›› Issue (2): 52-59.doi: 10.1016/S1005-8885(15)60639-2

• Security • Previous Articles     Next Articles

Two constructions of A3-codes from projective geometry in finite fields

Chen ShangDi   

  • Received:2014-05-13 Revised:2014-12-07 Online:2015-04-30 Published:2015-04-22
  • Contact: Chen ShangDi E-mail:11csd@163.com
  • Supported by:

    National Nature Science Foundation of China

Abstract: An is extension of in which none of the three participants: transmitter, receiver and arbiter, is assumed trusted. In this article, from projective geometry over finite fields, two -codes were given, the parameters, and probabilities of successful attacks were computed.

Key words: projective geometry, finite field authentication,