要素 发表于 2025-3-30 08:30:43
http://reply.papertrans.cn/31/3007/300622/300622_51.png分开 发表于 2025-3-30 15:27:33
http://reply.papertrans.cn/31/3007/300622/300622_52.pnginferno 发表于 2025-3-30 17:53:47
Unidirectional error detecting codes,nal errors. In this paper we consider the problem of mapping information sequences of length . into code-words of a .-unidirectional error detecting code of length .. In case of systematic codes we show that the parameters . and . must satisfy the relation .≤2. −2.+.. Moreover, we give a simple systforbid 发表于 2025-3-30 22:15:45
http://reply.papertrans.cn/31/3007/300622/300622_54.pngCeramic 发表于 2025-3-31 01:21:32
A survey of identification schemes,ty. The protocols used in these schemes are minimum (or even zero)-knowledge protocols, in that they provably leak no substantial knowledge on the entity‘s secret key, provided the mathematical problems on which they lie are effectively hard. Are considered schemes based on factorization problem (Fi轻快带来危险 发表于 2025-3-31 05:35:55
A correlation cryptographic scheme,rix .. The key to the system is an error vector of weight smaller than the error capacity which is added to the coded information vector. Polynomial time attacks have been devised against this scheme..In this work we introduce a secret key coding scheme which relies on a subset . of a particular setMelanocytes 发表于 2025-3-31 11:55:19
http://reply.papertrans.cn/31/3007/300622/300622_57.pnglymphoma 发表于 2025-3-31 17:09:36
,The weights of the duals of binary bch codes of designed distance δ=9,ABHOR 发表于 2025-3-31 20:45:06
http://reply.papertrans.cn/31/3007/300622/300622_59.png纹章 发表于 2025-3-31 21:59:43
http://reply.papertrans.cn/31/3007/300622/300622_60.png