派博傳思國際中心

標(biāo)題: Titlebook: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes; 18th International S Maria Bras-Amorós,Tom H?holdt Conference proceedings [打印本頁]

作者: deliberate    時間: 2025-3-21 20:06
書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes影響因子(影響力)




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes影響因子(影響力)學(xué)科排名




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes網(wǎng)絡(luò)公開度




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes被引頻次




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes被引頻次學(xué)科排名




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes年度引用




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes年度引用學(xué)科排名




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes讀者反饋




書目名稱Applied Algebra, Algebraic Algorithms and Error-Correcting Codes讀者反饋學(xué)科排名





作者: Infect    時間: 2025-3-21 23:38
0302-9743 ting Codes, AAECC-18, held in Tarragona, Spain, in June 2009. The 22 revised full papers presented together with 7 extended absstracts were carefully reviewed and selected from 50 submissions. Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings,
作者: 易達到    時間: 2025-3-22 00:25

作者: liposuction    時間: 2025-3-22 05:48

作者: 點燃    時間: 2025-3-22 12:32

作者: intuition    時間: 2025-3-22 16:56

作者: 邪惡的你    時間: 2025-3-22 17:55

作者: 心神不寧    時間: 2025-3-23 00:10

作者: 宏偉    時間: 2025-3-23 04:33

作者: overshadow    時間: 2025-3-23 09:22
On Elliptic Convolutional Goppa Codest bounds. We provide a number of examples for different values of their parameters, including some explicit strongly MDS convolutional codes. We also introduce some conditions for certain codes of this class to be MDS.
作者: 動作謎    時間: 2025-3-23 13:44
Word Oriented Cascade Jump ,?LFSRconstructions make use of special word oriented .?LFSRs, which can be efficiently implemented on modern CPU and only require few memory. Experimental results show that one type of efficient word oriented cascade jump .?LFSRs can be used as building blocks for software oriented stream cipher.
作者: Tracheotomy    時間: 2025-3-23 15:31
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKEed in the above paper; to our best knowledge, this is the first example of length-preserving hybrid encryption; 2) postquantum deterministic encryption (using the IND-CPA variant of code-based McEliece PKE) which enjoys a simplified construction, where the public key is re-used as a hash function.
作者: CORE    時間: 2025-3-23 21:34

作者: amenity    時間: 2025-3-24 01:59
On Some Sequences of the Secret Pseudo-random Index , in RC4 Key Schedulingresults on the probability and the number of such sequences. As an application, we explain a new secret key recovery algorithm that can recover a 16 bytes secret key with a success probability of 0.1409. Our strategy has high time complexity at this point and requires further improvement to be feasible in practice.
作者: 小畫像    時間: 2025-3-24 03:10

作者: cipher    時間: 2025-3-24 07:02
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensionsonditional user anonymity against a semi-honest server. If the pre-computation is allowed, the computation cost of the . protocol is the same as the well-known Diffie-Hellman protocol! In addition, we extend the . protocol in two ways.
作者: 多產(chǎn)子    時間: 2025-3-24 13:38

作者: 疾馳    時間: 2025-3-24 17:09
0302-9743 fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra: algebraic algorithms and transforms; sequences and boolean functions.978-3-642-02180-0978-3-642-02181-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: Ambiguous    時間: 2025-3-24 19:09
Energy Resources in East African-abelian group of matrices is used. The primary advantadge of this scheme is that no prime numbers are used and the efficiency is guaranteed by the use of a quick exponentiation algorithm for this group of matrices.
作者: irreparable    時間: 2025-3-24 23:52
Energy Resources in East Africaonditional user anonymity against a semi-honest server. If the pre-computation is allowed, the computation cost of the . protocol is the same as the well-known Diffie-Hellman protocol! In addition, we extend the . protocol in two ways.
作者: 古老    時間: 2025-3-25 07:21

作者: 昏睡中    時間: 2025-3-25 09:35

作者: 迫擊炮    時間: 2025-3-25 14:37
https://doi.org/10.1007/978-90-481-2383-4Using stratified sampling a desired confidence level and a specified margin of error can be achieved with smaller sample size than under standard sampling. We apply stratified sampling to the simulation of the sum-product algorithm on a binary low-density parity-check code.
作者: Endearing    時間: 2025-3-25 17:05

作者: Haphazard    時間: 2025-3-25 22:23

作者: Magnificent    時間: 2025-3-26 02:59

作者: organic-matrix    時間: 2025-3-26 04:27

作者: arthrodesis    時間: 2025-3-26 10:34

作者: Dignant    時間: 2025-3-26 13:37
Simulation of the Sum-Product Algorithm Using Stratified SamplingUsing stratified sampling a desired confidence level and a specified margin of error can be achieved with smaller sample size than under standard sampling. We apply stratified sampling to the simulation of the sum-product algorithm on a binary low-density parity-check code.
作者: 記成螞蟻    時間: 2025-3-26 18:48

作者: predict    時間: 2025-3-26 22:47
There Are Not Non-obvious Cyclic Affine-invariant CodesWe show that an affine-invariant code . of length .. is not permutation equivalent to a cyclic code except in the obvious cases: .?=?1 or . is either {0}, the repetition code or its dual.
作者: Circumscribe    時間: 2025-3-27 03:03
Noisy Interpolation of Multivariate Sparse Polynomials in Finite FieldsWe consider the problem of recovering an unknown sparse multivariate polynomial . over a finite field . of prime order . from approximate values of .(..,...,..) at polynomially many points . selected uniformly at random. Our result is based on a combination of bounds on exponential sums with the lattice reduction technique.
作者: 逢迎白雪    時間: 2025-3-27 08:39
From the Euclidean Algorithm for Solving a Key Equation for Dual Reed–Solomon Codes to the Berlekamprithm, both designed to solve a key equation. This article presents a new version of the key equation and a way to use the Euclidean algorithm to solve it. A straightforward reorganization of the algorithm yields the Berlekamp-Massey algorithm.
作者: 方便    時間: 2025-3-27 11:42

作者: 沙草紙    時間: 2025-3-27 13:36

作者: Incompetent    時間: 2025-3-27 20:23
On Self-dual Codes over ,,.. and give a necessary and sufficient condition for the self-duality of induced codes. We then give an inductive algorithm for constructing all self-dual codes over .., and establish the mass formula, which counts the number of such codes.
作者: 消息靈通    時間: 2025-3-27 23:05

作者: acquisition    時間: 2025-3-28 03:48
978-3-642-02180-0Springer-Verlag Berlin Heidelberg 2009
作者: aneurysm    時間: 2025-3-28 09:46

作者: STANT    時間: 2025-3-28 13:04

作者: 步履蹣跚    時間: 2025-3-28 17:41
https://doi.org/10.1007/978-90-481-2383-4s and properties as the codes in the usual binary linear Reed-Muller family have been introduced. A structural invariant, the rank, for binary codes is used to classify some of these ?.-linear codes. The rank is established generalizing the known results about the rank for ?.-linear Hadamard and ?.-
作者: angiography    時間: 2025-3-28 19:51
https://doi.org/10.1007/978-90-481-2383-4f the BIBD graphs and show that they yield optimal expander graphs that are also bipartite Ramanujan graphs. In particular, we show that the bipartite graphs derived from finite projective and affine geometries yield optimal Ramanujan graphs. This in turn leads to a theoretical explanation of the go
作者: 賞錢    時間: 2025-3-28 23:03

作者: hurricane    時間: 2025-3-29 06:44

作者: 苦澀    時間: 2025-3-29 07:30

作者: 極小    時間: 2025-3-29 13:40
Energy Resources in East Africaoosing properly certain parameters, the order of the subgroup generated by one of these matrices can be as large as needed. Secondly, we propose and implement a new key exchange scheme based on these primitives. The security of the proposed system is based on discrete logarithm problem although a no
作者: TERRA    時間: 2025-3-29 15:43
https://doi.org/10.1007/978-3-540-35669-1 in software. In this paper word oriented cascade jump registers are presented based on the design idea of bit oriented cascade jump registers. Their constructions make use of special word oriented .?LFSRs, which can be efficiently implemented on modern CPU and only require few memory. Experimental
作者: 蚊帳    時間: 2025-3-29 22:50
Energy Resources in East Africaete KSA of RC4. It is known that the value of . in round .?+?1 can be predicted with high probability from ..[.] for the initial values of . and from . for the final values of .. This fact has been exploited in several recent works on secret key recovery from ... In this paper, we perform extensive
作者: 重疊    時間: 2025-3-30 02:59

作者: 假裝是我    時間: 2025-3-30 07:54

作者: 大炮    時間: 2025-3-30 08:15
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes978-3-642-02181-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 無王時期,    時間: 2025-3-30 15:18
https://doi.org/10.1007/978-90-481-2383-4rithm, both designed to solve a key equation. This article presents a new version of the key equation and a way to use the Euclidean algorithm to solve it. A straightforward reorganization of the algorithm yields the Berlekamp-Massey algorithm.
作者: TSH582    時間: 2025-3-30 17:27
https://doi.org/10.1007/978-90-481-2383-4s and properties as the codes in the usual binary linear Reed-Muller family have been introduced. A structural invariant, the rank, for binary codes is used to classify some of these ?.-linear codes. The rank is established generalizing the known results about the rank for ?.-linear Hadamard and ?.-linear extended 1-perfect codes.
作者: investigate    時間: 2025-3-31 00:38
https://doi.org/10.1007/978-90-481-2383-4f the BIBD graphs and show that they yield optimal expander graphs that are also bipartite Ramanujan graphs. In particular, we show that the bipartite graphs derived from finite projective and affine geometries yield optimal Ramanujan graphs. This in turn leads to a theoretical explanation of the good performance of a class of LDPC codes.
作者: Aromatic    時間: 2025-3-31 01:14
Sakib Bin Amin,Saanjaana Rahman.. and give a necessary and sufficient condition for the self-duality of induced codes. We then give an inductive algorithm for constructing all self-dual codes over .., and establish the mass formula, which counts the number of such codes.
作者: 殺子女者    時間: 2025-3-31 05:56
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/a/image/159620.jpg
作者: overbearing    時間: 2025-3-31 09:48
An Extension of the Order Bound for AG Codesng-Rao bound. By using a finer partition of the set of all codewords of a code we improve the order bounds by Beelen and by Duursma and Park. We show that the new bound can be efficiently optimized and we include a numerical comparison of different bounds for all two-point codes with Goppa distance
作者: 召集    時間: 2025-3-31 16:08

作者: FICE    時間: 2025-3-31 20:00

作者: FRAX-tool    時間: 2025-4-1 01:07

作者: 填料    時間: 2025-4-1 03:40

作者: 錯事    時間: 2025-4-1 06:39
On Elliptic Convolutional Goppa Codesonal codes. We present here this construction carried out over elliptic curves, yielding a variety of codes which are optimal with respect to different bounds. We provide a number of examples for different values of their parameters, including some explicit strongly MDS convolutional codes. We also




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
合山市| 汉川市| 望奎县| 岳池县| 辽中县| 旬阳县| 岗巴县| 邵阳市| 鹤山市| 册亨县| 渭南市| 察哈| 海门市| 尖扎县| 且末县| 特克斯县| 平陆县| 黔西县| 祁东县| 唐海县| 五华县| 平顺县| 安多县| 菏泽市| 荃湾区| 江门市| 贵南县| 肃宁县| 盐亭县| 温泉县| 库伦旗| 枝江市| 尚义县| 大田县| 筠连县| 邯郸市| 新源县| 清河县| 大余县| 舒城县| 商洛市|