Picks-Disease 发表于 2025-3-28 15:53:00

http://reply.papertrans.cn/16/1597/159624/159624_41.png

Mast-Cell 发表于 2025-3-28 20:56:15

Energy Security and Development an application of our constructions, we provide a new pre-distributed primitive which yields non-interactive unconditionally secure zero knowledge proofs of any polynomial relation among commitments.

难解 发表于 2025-3-29 01:36:23

A. A. Amrutha,P. Balachandra,M. Mathirajan written for linear code of length 2. of code ., where . for two different comprehensive codes .. As a result we obtain two different expressions for weight enumerator of code ...As example we consider a case ., where . . is the .-th order Reed-Muller code of lenght . = 2...

flamboyant 发表于 2025-3-29 05:06:17

Shujie Yao,Maria Jesus Herreriases these two constructions, and asks whether each algebraic construction is equivalent to a combinatorial construction. We answer this question by giving an explicit counterexample in dimension 165 which has been constructed with the help of a computer algebra system.

开玩笑 发表于 2025-3-29 08:39:48

http://reply.papertrans.cn/16/1597/159624/159624_45.png

obstruct 发表于 2025-3-29 14:48:47

Fast Point Multiplication on Elliptic Curves through Isogenies,of the more general notion of isogenies to rescale the curve. As a side result, this also illustrates that selecting elliptic curves with . = −3 (as those recommended in most standards) is not restrictive.

妈妈不开心 发表于 2025-3-29 18:02:08

Unconditionally Secure Homomorphic Pre-distributed Commitments, an application of our constructions, we provide a new pre-distributed primitive which yields non-interactive unconditionally secure zero knowledge proofs of any polynomial relation among commitments.

ADORE 发表于 2025-3-29 23:29:57

Relative Duality in MacWilliams Identity, written for linear code of length 2. of code ., where . for two different comprehensive codes .. As a result we obtain two different expressions for weight enumerator of code ...As example we consider a case ., where . . is the .-th order Reed-Muller code of lenght . = 2...

arbiter 发表于 2025-3-30 01:23:11

http://reply.papertrans.cn/16/1597/159624/159624_49.png

小隔间 发表于 2025-3-30 07:21:04

Antonio Marquina,Mely Caballero-Anthonyace at least one of the pirates in such a collusion..In this paper we prove that socalled (2, 2)-separating codes often are collusion-secure against two pirates. In particular, we consider the best known explicit asymptotic construction of such codes, and prove that it is collusion-secure with better rate than any previously known schemes.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes; 15th International S Marc Fossorier,Tom Høholdt,Alain Poli Conference pro