Serenity
发表于 2025-3-26 22:59:35
Concatenated codes with convolutional inner and outer codes,In this paper a short description of concatenated codes with inner convolutional codes is given. The distance parameters of such codes can be estimated using the extended row and column distances of the inner and outer codes.
Cerebrovascular
发表于 2025-3-27 05:02:01
http://reply.papertrans.cn/32/3150/314917/314917_32.png
bromide
发表于 2025-3-27 07:58:50
http://reply.papertrans.cn/32/3150/314917/314917_33.png
连词
发表于 2025-3-27 12:01:12
http://reply.papertrans.cn/32/3150/314917/314917_34.png
600
发表于 2025-3-27 15:43:32
http://reply.papertrans.cn/32/3150/314917/314917_35.png
paroxysm
发表于 2025-3-27 18:12:07
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/314917.jpg
跳脱衣舞的人
发表于 2025-3-27 22:01:07
http://reply.papertrans.cn/32/3150/314917/314917_37.png
杀死
发表于 2025-3-28 04:28:03
Susceptibility of digital signature schemes based on error-correcting codes to universal forgery,ptible to several different attacks. The authors have since devised and presented a scheme that is impervious to the attacks that were successfully applied to the earlier schemes. It is shown in this paper that this new scheme and Xinmei‘s scheme are vulnerable to universal forgeries. Equipped with
知识分子
发表于 2025-3-28 08:09:30
http://reply.papertrans.cn/32/3150/314917/314917_39.png
Ferritin
发表于 2025-3-28 12:58:47
Linear algebra approach to secret sharing schemes, performance of linear secret sharing schemes using the tools of linear algebra and coding theory. In particular, the nonexistence of an ideal threshold linear 555 for the case where the number of participants is twice as large as the number of possible values of a secret is shown.