和蔼 发表于 2025-3-25 04:27:31
http://reply.papertrans.cn/39/3838/383710/383710_21.png流出 发表于 2025-3-25 09:59:50
Applications of Finite Geometry to Cryptographythreshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.混合物 发表于 2025-3-25 13:17:00
Authentication / Secrecy Codesconditional secrecy due to Shannon Simmons developed a theory of unconditional authentication . In this paper we give some bounds and constructions for authentication/secrecy codes with splitting, based on finite geometry and combinatorics.Generator 发表于 2025-3-25 16:36:49
http://reply.papertrans.cn/39/3838/383710/383710_24.png反叛者 发表于 2025-3-25 20:32:15
http://reply.papertrans.cn/39/3838/383710/383710_25.png反复无常 发表于 2025-3-26 00:26:51
Geometries, Codes and Cryptography978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706Serenity 发表于 2025-3-26 06:07:25
http://reply.papertrans.cn/39/3838/383710/383710_27.pngINCH 发表于 2025-3-26 12:19:50
http://reply.papertrans.cn/39/3838/383710/383710_28.png摇曳 发表于 2025-3-26 13:57:52
http://reply.papertrans.cn/39/3838/383710/383710_29.pngRejuvenate 发表于 2025-3-26 18:15:52
Praktische Beobachtungen und Erfahrungen,sembled in two or more geometrical dimensions or directions, with emphasis on simple component codes and low complexity methods of decoding. Array codes were first discussed by Elias , and useful introductory references include . The following books have significant sections devo