Serenity 发表于 2025-3-26 22:59:35
Concatenated codes with convolutional inner and outer codes,In this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.Cerebrovascular 发表于 2025-3-27 05:02:01
http://reply.papertrans.cn/32/3150/314917/314917_32.pngbromide 发表于 2025-3-27 07:58:50
http://reply.papertrans.cn/32/3150/314917/314917_33.png连词 发表于 2025-3-27 12:01:12
http://reply.papertrans.cn/32/3150/314917/314917_34.png600 发表于 2025-3-27 15:43:32
http://reply.papertrans.cn/32/3150/314917/314917_35.pngparoxysm 发表于 2025-3-27 18:12:07
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/314917.jpg跳脱衣舞的人 发表于 2025-3-27 22:01:07
http://reply.papertrans.cn/32/3150/314917/314917_37.png杀死 发表于 2025-3-28 04:28:03
Susceptibility of digital signature schemes based on error-correcting codes to universal forgery,ptible to several different attacks. The authors have since devised and presented a scheme that is impervious to the attacks that were successfully applied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei‘s scheme are vulnerable to universal forgeries. Equipped with知识分子 发表于 2025-3-28 08:09:30
http://reply.papertrans.cn/32/3150/314917/314917_39.pngFerritin 发表于 2025-3-28 12:58:47
Linear algebra approach to secret sharing schemes, performance of linear secret sharing schemes using the tools of linear algebra and coding theory. In particular, the nonexistence of an ideal threshold linear 555 for the case where the number of participants is twice as large as the number of possible values of a secret is shown.