Picks-Disease 发表于 2025-3-28 15:53:00
http://reply.papertrans.cn/16/1597/159624/159624_41.pngMast-Cell 发表于 2025-3-28 20:56:15
Energy Security and Development an application of our constructions, we provide a new pre-distributed primitive which yields non-interactive unconditionally secure zero knowledge proofs of any polynomial relation among commitments.难解 发表于 2025-3-29 01:36:23
A. A. Amrutha,P. Balachandra,M. Mathirajan written for linear code of length 2. of code ., where . for two different comprehensive codes .. As a result we obtain two different expressions for weight enumerator of code ...As example we consider a case ., where . . is the .-th order Reed-Muller code of lenght . = 2...flamboyant 发表于 2025-3-29 05:06:17
Shujie Yao,Maria Jesus Herreriases these two constructions, and asks whether each algebraic construction is equivalent to a combinatorial construction. We answer this question by giving an explicit counterexample in dimension 165 which has been constructed with the help of a computer algebra system.开玩笑 发表于 2025-3-29 08:39:48
http://reply.papertrans.cn/16/1597/159624/159624_45.pngobstruct 发表于 2025-3-29 14:48:47
Fast Point Multiplication on Elliptic Curves through Isogenies,of the more general notion of isogenies to rescale the curve. As a side result, this also illustrates that selecting elliptic curves with . = −3 (as those recommended in most standards) is not restrictive.妈妈不开心 发表于 2025-3-29 18:02:08
Unconditionally Secure Homomorphic Pre-distributed Commitments, an application of our constructions, we provide a new pre-distributed primitive which yields non-interactive unconditionally secure zero knowledge proofs of any polynomial relation among commitments.ADORE 发表于 2025-3-29 23:29:57
Relative Duality in MacWilliams Identity, written for linear code of length 2. of code ., where . for two different comprehensive codes .. As a result we obtain two different expressions for weight enumerator of code ...As example we consider a case ., where . . is the .-th order Reed-Muller code of lenght . = 2...arbiter 发表于 2025-3-30 01:23:11
http://reply.papertrans.cn/16/1597/159624/159624_49.png小隔间 发表于 2025-3-30 07:21:04
Antonio Marquina,Mely Caballero-Anthonyace at least one of the pirates in such a collusion..In this paper we prove that socalled (2, 2)-separating codes often are collusion-secure against two pirates. In particular, we consider the best known explicit asymptotic construction of such codes, and prove that it is collusion-secure with better rate than any previously known schemes.