BRACE 发表于 2025-3-23 12:07:32
http://reply.papertrans.cn/39/3838/383710/383710_11.pngliaison 发表于 2025-3-23 17:48:08
http://reply.papertrans.cn/39/3838/383710/383710_12.png公司 发表于 2025-3-23 20:03:58
http://reply.papertrans.cn/39/3838/383710/383710_13.pngUrea508 发表于 2025-3-24 00:46:21
http://reply.papertrans.cn/39/3838/383710/383710_14.pngperimenopause 发表于 2025-3-24 06:17:42
An Introduction to the Theory of Unconditional Secrecy and AuthenticationA few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.Decline 发表于 2025-3-24 06:46:21
http://reply.papertrans.cn/39/3838/383710/383710_16.pngCupidity 发表于 2025-3-24 14:07:14
,Ein effektives Programmiermodell für ALVs,g. General concepts on Galois geometry and Steiner systems. The theory of h-sets in Steiner systems, with particular attention to Galois spaces. The theory of blocking sets, the even and odd type sets in a Steiner system. Applications to linear error correcting codes.Daily-Value 发表于 2025-3-24 18:51:23
https://doi.org/10.1007/978-3-7091-3875-5threshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.征服 发表于 2025-3-24 21:47:48
http://reply.papertrans.cn/39/3838/383710/383710_19.png懒洋洋 发表于 2025-3-25 01:11:50
http://reply.papertrans.cn/39/3838/383710/383710_20.png