找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptography and Coding; 12th IMA Internation Matthew G. Parker Conference proceedings 2009 Springer-Verlag Berlin Heidelberg 2009 Code.DES

[复制链接]
楼主: Harding
发表于 2025-3-28 16:09:08 | 显示全部楼层
发表于 2025-3-28 20:20:59 | 显示全部楼层
发表于 2025-3-29 02:33:41 | 显示全部楼层
Włodzimierz Czernuszenko,Paweł M. Rowińskient a method to construct key predistribution schemes from linear codes that provide new families of KPSs and OTBESs for an arbitrarily large number of users and with secret keys of constant size. As a consequence of the Gilbert-Varshamov bound, we can prove that our KPSs are asymptotically more eff
发表于 2025-3-29 06:33:08 | 显示全部楼层
Towards Informed Web Content Deliveryer is that it does not involve key update phase for all non-revoked users interacting with the key authority. In this paper, we present the first . scheme that allows senders to select on-the-fly when encrypting whether to use either direct or indirect revocation mode; therefore, it combines best ad
发表于 2025-3-29 11:11:12 | 显示全部楼层
On Linear Programming Decoding on a Quantized Additive White Gaussian Noise Channeland the corresponding quantization region thresholds, that minimize the PEP of wrongly decoding to a non-zero codeword . when the all-zero codeword is transmitted is independent of the specific codeword .. However, this is not the case with LP decoding based on a parity-check matrix ., which means t
发表于 2025-3-29 12:37:29 | 显示全部楼层
Security of Cyclic Double Block Length Hash Functionshan .(. share a common key). Furthermore we give a practical DBL construction that has the highest security guarantee of all DBL compression functions currently known in literature. We also provide a (relatively weak) analysis of preimage resistance for ..
发表于 2025-3-29 16:34:51 | 显示全部楼层
A New Protocol for the Nearby Friend Problemnearby. Similarly, no eavesdropper should be able to gain any information about their actual locations, whether they are actually nearby or not. The problem becomes more challenging as both Alice and Bob are restricted in computational power and communication bandwidth. Starting from an earlier work
发表于 2025-3-29 23:12:35 | 显示全部楼层
发表于 2025-3-30 00:07:55 | 显示全部楼层
发表于 2025-3-30 07:54:22 | 显示全部楼层
Nansook Park,Christopher PetersonIn this paper, we establish a mass formula for even codes over .. In particular, a formula giving the total number of distinct Type II self-dual codes over . of length . is established for each positive integer . divisible by 8.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-26 07:30
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表