Premium
Authentication perpendicular arrays APA 1 (2, 5, v)
Author(s) -
Ge G.,
Zhu L.
Publication year - 1996
Publication title -
journal of combinatorial designs
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.618
H-Index - 34
eISSN - 1520-6610
pISSN - 1063-8539
DOI - 10.1002/(sici)1520-6610(1996)4:5<365::aid-jcd5>3.0.co;2-d
Subject(s) - perpendicular , secrecy , authentication (law) , mathematics , combinatorics , crystallography , computer science , geometry , chemistry , computer security
Authentication perpendicular arrays APA λ ( t, k, v ), as a special kind of perpendicular arrays, are introduced by D. R. Stinson in constructing authentication and secrecy codes. In this article, we improve the existence results for APA 1 (2, 5, v ) and show that such a design exists if and only if v ≥ 5 is odd, except v = 7 and possibly excepting v = 9, 13, 15, 17, 33, 39, 49, 53, 57, 63, 69, 73, 87, 89, 97, 113, 137, and 213. © 1996 John Wiley & Sons, Inc.