decoction 发表于 2025-3-21 19:02:44

书目名称Codes, Cryptology, and Information Security影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0228848<br><br>        <br><br>书目名称Codes, Cryptology, and Information Security读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0228848<br><br>        <br><br>

十字架 发表于 2025-3-21 23:46:59

http://reply.papertrans.cn/23/2289/228848/228848_2.png

AVID 发表于 2025-3-22 01:01:53

http://reply.papertrans.cn/23/2289/228848/228848_3.png

BINGE 发表于 2025-3-22 04:57:26

978-3-319-18680-1Springer International Publishing Switzerland 2015

统治人类 发表于 2025-3-22 10:09:35

Said El Hajji,Abderrahmane Nitaj,El Mamoun SouidiIncludes supplementary material:

有斑点 发表于 2025-3-22 15:05:23

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/228848.jpg

有斑点 发表于 2025-3-22 17:18:17

http://reply.papertrans.cn/23/2289/228848/228848_7.png

gene-therapy 发表于 2025-3-23 00:58:03

http://reply.papertrans.cn/23/2289/228848/228848_8.png

Connotation 发表于 2025-3-23 03:29:59

Bai Li,Lynn Margaret Batten,Robin Dossof the field divides the length of the code. These are called repeated-root cyclic isodual codes over finite fields. The constructions are based on the field characteristic, the generator polynomial and the length of the code.

相容 发表于 2025-3-23 07:55:58

http://reply.papertrans.cn/23/2289/228848/228848_10.png
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Codes, Cryptology, and Information Security; First International Said El Hajji,Abderrahmane Nitaj,El Mamoun Souidi Conference proceedings