{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:17:37Z","timestamp":1774678657329,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[1995,5,1]],"date-time":"1995-05-01T00:00:00Z","timestamp":799286400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des Codes Crypt"],"published-print":{"date-parts":[[1995,5]]},"DOI":"10.1007\/bf01388389","type":"journal-article","created":{"date-parts":[[2005,4,2]],"date-time":"2005-04-02T08:37:09Z","timestamp":1112431029000},"page":"269-280","source":"Crossref","is-referenced-by-count":8,"title":["On the construction of authentication and secrecy codes"],"prefix":"10.1007","volume":"5","author":[{"given":"Trung","family":"Van Tran","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"CR1","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/S0021-9800(69)80096-7","volume":"6","author":"W. O. Alltop","year":"1969","unstructured":"W. O. Alltop, An infinite class of 4-designs,J. Combin. Theory, Vol. 6 (1969) pp. 320?322.","journal-title":"J. Combin. Theory"},{"key":"CR2","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/0097-3165(86)90006-3","volume":"42","author":"E. F. Assmus","year":"1986","unstructured":"E. F. Assmus and J. D. Key, On an infinite class of Steiner systems witht=3 andk=6.J. Combin. Theory (A), Vol. 42 (1986) pp. 55?60.","journal-title":"J. Combin. Theory (A)"},{"key":"CR3","volume-title":"Design Theory","author":"T. Beth","year":"1985","unstructured":"T. Beth, D. Jungnickel, and H. Lenz,Design Theory, Bibliographisches Institut, Mannheim-Wien-Z\u00fcrich (1985)."},{"key":"CR4","unstructured":"J. Bierbrauer,A new family of 4-designs, preprint."},{"key":"CR5","doi-asserted-by":"crossref","unstructured":"J. Bierbrauer, A family of 4-designs with block size 9,Discrete Math., to appear.","DOI":"10.1016\/0012-365X(94)00192-L"},{"key":"CR6","unstructured":"J. Bierbrauer,Some friends of Alltop's designs 4?(2 f +1, 5, 5), preprint."},{"key":"CR7","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1007\/BF01189922","volume":"58","author":"J. Bierbrauer","year":"1992","unstructured":"J. Bierbrauer, Monotypical uniformly homogeneous sets of permutations,Arch. Math., Vol. 58 (1992) pp. 338?344.","journal-title":"Arch. Math."},{"key":"CR8","doi-asserted-by":"crossref","unstructured":"J. Bierbrauer, A family of perpendicular arrays achieving perfect 4-fold secrecy,Proceedings of the 13th British Combinatorial Conference, to appear.","DOI":"10.1016\/0012-365X(94)90144-9"},{"key":"CR9","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/BF00157618","volume":"1","author":"J. Bierbrauer","year":"1991","unstructured":"J. Bierbrauer and Tran van Trung, HalvingPGL(2, 2 f ),f odd: A series of cryptocodes,Designs, Codes and Cryptography, Vol. 1 (1991) pp. 141?148.","journal-title":"Designs, Codes and Cryptography"},{"key":"CR10","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/BF00124606","volume":"1","author":"J. Bierbrauer","year":"1992","unstructured":"J. Bierbrauer and Tran van Trung, Some highly symmetric authentication perpendicular arrays,Designs, Codes and Cryptography, Vol. 1 (1992) pp. 307?319.","journal-title":"Designs, Codes and Cryptography"},{"key":"CR11","unstructured":"A. E. Brouwer, Thet-designs withv<18,Stichting Mathematisch Centrum, ZN 76\/77."},{"key":"CR12","first-page":"193","volume":"29","author":"Y. M. Chee","year":"1990","unstructured":"Y. M. Chee, C. J. Colbourn and D. L. Kreher, Simplet-designs withv?30,Ars Combinatoria, Vol. 29 (1990) pp. 193?258.","journal-title":"Ars Combinatoria"},{"key":"CR13","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1112\/blms\/8.3.263","volume":"8","author":"R. H. F. Denniston","year":"1976","unstructured":"R. H. F. Denniston, Some new 5-designs,Bull. London Math. Soc., Vol. 8 (1976) pp. 263?267.","journal-title":"Bull. London Math. Soc."},{"key":"CR14","unstructured":"M. J. Grannell and T. S. Griggs,A Steiner system S(5, 6, 108), preprint."},{"key":"CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0097-3165(79)90050-5","volume":"26","author":"H. Hanani","year":"1979","unstructured":"H. Hanani, A class of three-designs,J. Combin. Theory (A), Vol. 26 (1979) pp. 1?19.","journal-title":"J. Combin. Theory (A)"},{"key":"CR16","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/0012-365X(83)90177-2","volume":"45","author":"H. Hanani","year":"1983","unstructured":"H. Hanani, A. Hartman and E. S. Kramer, On three-designs of small order,Discrete Math., Vol. 45 (1983) pp. 75?97.","journal-title":"Discrete Math."},{"key":"CR17","doi-asserted-by":"crossref","first-page":"761","DOI":"10.2307\/2373244","volume":"87","author":"D. R. Hughes","year":"1965","unstructured":"D. R. Hughes, Ont-designs and groups,Amer. J. Math., Vol. 87 (1965) pp. 761?778.","journal-title":"Amer. J. Math."},{"key":"CR18","first-page":"213","volume":"14","author":"D. Jungnickel","year":"1987","unstructured":"D. Jungnickel and S. A. Vanstone, Hyperfactorizations of graphs and 5-designs,J. Univ. Kuwait (Sci.), Vol. 14 (1987) pp. 213?223.","journal-title":"J. Univ. Kuwait (Sci.)"},{"key":"CR19","unstructured":"E. S. Kramer, Somet-designs fort?4 andv=17, 18,Proc. 6th S.E. Conf. Combinatorics, Graph Theory and Computing (Boca Raton 1975) Congressus Numerantium XIV, Utilitas Math. Publ., Winnipeg (1975) pp. 443?460."},{"key":"CR20","first-page":"215","volume":"28","author":"E. S. Kramer","year":"1989","unstructured":"E. S. Kramer, D. L. Kreher, R. L. Rees and D. R. Stinson, On perpendicular arrays witht?3,Ars Combinatoria, Vol. 28 (1989) pp. 215?223.","journal-title":"Ars Combinatoria"},{"key":"CR21","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/0012-365X(91)90228-T","volume":"96","author":"E. S. Kramer","year":"1991","unstructured":"E. S. Kramer, S. S. Magliveras, Tran van Trung, and Qui-rong Wu, On the construction of some perpendicular arrays for arbitrarily larget, Discrete Math., Vol. 96 (1991) pp. 101?110.","journal-title":"Discrete Math."},{"key":"CR22","first-page":"25","volume":"31","author":"C. C. Lindner","year":"1987","unstructured":"C. C. Lindner, R. C. Mullin, and G. H. J. van Rees, Separable orthogonal arrays,Utilitas Math., Vol. 31 (1987) pp. 25?32.","journal-title":"Utilitas Math."},{"key":"CR23","unstructured":"R. Mathon, A new Steiner systemS(5, 6, 132), personal communication."},{"key":"CR24","first-page":"193","volume":"6","author":"W. H. Mills","year":"1978","unstructured":"W. H. Mills, A new 5-design,Ars Combinatoria, Vol. 6 (1978) pp. 193?195.","journal-title":"Ars Combinatoria"},{"key":"CR25","first-page":"141","volume":"18","author":"R. C. Mullin","year":"1980","unstructured":"R. C. Mullin, P. J. Schellenberg, G. H. J. van Rees, and S. A. Vanstone, On the construction of perpendicular arrays,Utilitas Math., Vol. 18 (1980) pp. 141?160.","journal-title":"Utilitas Math."},{"key":"CR26","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/BF00206324","volume":"1","author":"D. R. Stinson","year":"1988","unstructured":"D. R. Stinson, Some constructions and bounds for authentication codes,J. Cryptology, Vol. 1 (1988) pp. 37?51.","journal-title":"J. Cryptology"},{"key":"CR27","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/BF02351720","volume":"1","author":"D. R. Stinson","year":"1988","unstructured":"D. R. Stinson, A construction for authentication\/secrecy codes from certain combinatorial designs,J. Cryptology, Vol. 1 (1988) pp. 119?127.","journal-title":"J. Cryptology"},{"key":"CR28","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1007\/BF02252868","volume":"2","author":"D. R. Stinson","year":"1990","unstructured":"D. R. Stinson, The combinatorics of authentication and secrecy codes,J. Cryptology, Vol. 2 (1990) pp. 23?49.","journal-title":"J. Cryptology"},{"key":"CR29","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/S0195-6698(13)80058-3","volume":"11","author":"D. R. Stinson","year":"1990","unstructured":"D. R. Stinson and L. Teirlinck, A construction for authentication\/secrecy codes from 3-homogeneous permutation groups,European J. Combin., Vol. 11 (1990) pp. 73?79.","journal-title":"European J. Combin."},{"key":"CR30","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/BF02948948","volume":"12","author":"E. Witt","year":"1938","unstructured":"E. Witt, \u00dcber Steinersche Systeme,Abh. Math. Sem. Hamburg, Vol. 12 (1938) pp. 265?275.","journal-title":"Abh. Math. Sem. Hamburg"},{"key":"CR31","unstructured":"Qui-rong Wu, On properties and constructions oft-designs, ?-designs and perpendicular arrays, Ph.D. dissertation, University of Nebraska-Lincoln (1991)."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388389\/fulltext.html","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388389.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF01388389\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF01388389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T20:11:55Z","timestamp":1625688715000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF01388389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,5]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1995,5]]}},"alternative-id":["BF01388389"],"URL":"https:\/\/doi.org\/10.1007\/bf01388389","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[1995,5]]}}}