BRACE 发表于 2025-3-23 12:07:32

http://reply.papertrans.cn/39/3838/383710/383710_11.png

liaison 发表于 2025-3-23 17:48:08

http://reply.papertrans.cn/39/3838/383710/383710_12.png

公司 发表于 2025-3-23 20:03:58

http://reply.papertrans.cn/39/3838/383710/383710_13.png

Urea508 发表于 2025-3-24 00:46:21

http://reply.papertrans.cn/39/3838/383710/383710_14.png

perimenopause 发表于 2025-3-24 06:17:42

An Introduction to the Theory of Unconditional Secrecy and AuthenticationA few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.

Decline 发表于 2025-3-24 06:46:21

http://reply.papertrans.cn/39/3838/383710/383710_16.png

Cupidity 发表于 2025-3-24 14:07:14

,Ein effektives Programmiermodell für ALVs,g. General concepts on Galois geometry and Steiner systems. The theory of h-sets in Steiner systems, with particular attention to Galois spaces. The theory of blocking sets, the even and odd type sets in a Steiner system. Applications to linear error correcting codes.

Daily-Value 发表于 2025-3-24 18:51:23

https://doi.org/10.1007/978-3-7091-3875-5threshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.

征服 发表于 2025-3-24 21:47:48

http://reply.papertrans.cn/39/3838/383710/383710_19.png

懒洋洋 发表于 2025-3-25 01:11:50

http://reply.papertrans.cn/39/3838/383710/383710_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Geometries, Codes and Cryptography; G. Longo,M. Marchi,A. Sgarro Book 1990 Springer-Verlag Wien 1990 algebra.authentication.coding.coding