和蔼
发表于 2025-3-25 04:27:31
http://reply.papertrans.cn/39/3838/383710/383710_21.png
流出
发表于 2025-3-25 09:59:50
Applications of Finite Geometry to Cryptographythreshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.
混合物
发表于 2025-3-25 13:17:00
Authentication / Secrecy Codesconditional secrecy due to Shannon Simmons developed a theory of unconditional authentication . In this paper we give some bounds and constructions for authentication/secrecy codes with splitting, based on finite geometry and combinatorics.
Generator
发表于 2025-3-25 16:36:49
http://reply.papertrans.cn/39/3838/383710/383710_24.png
反叛者
发表于 2025-3-25 20:32:15
http://reply.papertrans.cn/39/3838/383710/383710_25.png
反复无常
发表于 2025-3-26 00:26:51
Geometries, Codes and Cryptography978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706
Serenity
发表于 2025-3-26 06:07:25
http://reply.papertrans.cn/39/3838/383710/383710_27.png
INCH
发表于 2025-3-26 12:19:50
http://reply.papertrans.cn/39/3838/383710/383710_28.png
摇曳
发表于 2025-3-26 13:57:52
http://reply.papertrans.cn/39/3838/383710/383710_29.png
Rejuvenate
发表于 2025-3-26 18:15:52
Praktische Beobachtungen und Erfahrungen,sembled in two or more geometrical dimensions or directions, with emphasis on simple component codes and low complexity methods of decoding. Array codes were first discussed by Elias , and useful introductory references include . The following books have significant sections devo