Some Constructions for Authentication-Secrecy Codes

We deal with authentication / secrecy codes having unconditional security. Besides some new results for a “spoofing attack of order L”, we give several constructions using finite incidence structures (designs, generalized quadrangles).