找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Coding Theory and Applications; 3rd International Co Gérard Cohen,Jacques Wolfmann Conference proceedings 1989 Springer-Verlag Berlin Heide

[复制链接]
楼主: FERAL
发表于 2025-3-23 13:16:36 | 显示全部楼层
发表于 2025-3-23 17:36:27 | 显示全部楼层
https://doi.org/10.1007/978-94-009-5986-6We describe two methods for computing the minimun polynomial of an element in the finite field GF(q.);both methods have pratically no storage constraint and may improve by a factor 2.6 the classical method.
发表于 2025-3-23 19:03:02 | 显示全部楼层
https://doi.org/10.1007/978-94-009-5986-6In reference (1).R.D.Baker gives a convenient characterisation of Preparata codes..We here give a proof of his description and a similar one for Kerdock codes.
发表于 2025-3-23 22:18:48 | 显示全部楼层
Annotated and Illustrated Bibliography,In this paper we give an upper bound for the minimum distance of the q-ary image of a linear code over GF(q.). This allows us to give some indications about the minimum distance of the q-ary image of MDS codes over GF(q.) when q=2 and q=3.
发表于 2025-3-24 04:23:27 | 显示全部楼层
Codes from some Artin-Schreier curves,Parameters and generator matrices are given for the codes obtained by applying Goppa‘s algebraic-geometric construction method to some Artin-Schreier curves over F. where q = p. for some s∈N. Some results on automorphisms of these codes are given.
发表于 2025-3-24 08:30:14 | 显示全部楼层
New bounds on cyclic codes from algebraic curves,Starting from a deep link between the words of cyclic codes and plane algebraic curves over finite fields we use bounds on the number of rational points of these curves to obtain general bounds for the weights of cyclic codes.
发表于 2025-3-24 14:20:46 | 显示全部楼层
A new authentication algorithm,In this work we present a new authentication algorithm with modified versions suitable for identification and signature. It uses error correcting codes and binary field arithmetic. It has the property that counterfeiting attacks are equivalent to solving NP complete problems. It is easy to implement and is economical in computing power and memory.
发表于 2025-3-24 18:46:03 | 显示全部楼层
A method for finding codewords of small weight,We describe a probabilistic algorithm, which can be used to discover words of small weight in a linear binary code. The work-factor of the algorithm is asymptotically quite large but the method can be applied for codes of a medium size. Typical instances that are investigated are codewords of weight 20 in a code of length 300 and dimension 150.
发表于 2025-3-24 20:39:59 | 显示全部楼层
发表于 2025-3-25 00:33:18 | 显示全部楼层
Note for computing the minimun polynomial of elements in large finite fields,We describe two methods for computing the minimun polynomial of an element in the finite field GF(q.);both methods have pratically no storage constraint and may improve by a factor 2.6 the classical method.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-27 19:18
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表