Serenity 发表于 2025-3-26 22:59:35

Concatenated codes with convolutional inner and outer codes,In this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.

Cerebrovascular 发表于 2025-3-27 05:02:01

http://reply.papertrans.cn/32/3150/314917/314917_32.png

bromide 发表于 2025-3-27 07:58:50

http://reply.papertrans.cn/32/3150/314917/314917_33.png

连词 发表于 2025-3-27 12:01:12

http://reply.papertrans.cn/32/3150/314917/314917_34.png

600 发表于 2025-3-27 15:43:32

http://reply.papertrans.cn/32/3150/314917/314917_35.png

paroxysm 发表于 2025-3-27 18:12:07

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/314917.jpg

跳脱衣舞的人 发表于 2025-3-27 22:01:07

http://reply.papertrans.cn/32/3150/314917/314917_37.png

杀死 发表于 2025-3-28 04:28:03

Susceptibility of digital signature schemes based on error-correcting codes to universal forgery,ptible to several different attacks. The authors have since devised and presented a scheme that is impervious to the attacks that were successfully applied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei‘s scheme are vulnerable to universal forgeries. Equipped with

知识分子 发表于 2025-3-28 08:09:30

http://reply.papertrans.cn/32/3150/314917/314917_39.png

Ferritin 发表于 2025-3-28 12:58:47

Linear algebra approach to secret sharing schemes, performance of linear secret sharing schemes using the tools of linear algebra and coding theory. In particular, the nonexistence of an ideal threshold linear 555 for the case where the number of participants is twice as large as the number of possible values of a secret is shown.
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Error Control, Cryptology, and Speech Compression; Workshop on Informat Andrew Chmora,Stephen B. Wicker Conference proceedings 1994 Springe