派博傳思國際中心

標(biāo)題: Titlebook: Cryptography and Coding; 7th IMA Internationa Michael Walker Conference proceedings 1999 Springer-Verlag Berlin Heidelberg 1999 AES.Boolean [打印本頁]

作者: FARCE    時間: 2025-3-21 19:27
書目名稱Cryptography and Coding影響因子(影響力)




書目名稱Cryptography and Coding影響因子(影響力)學(xué)科排名




書目名稱Cryptography and Coding網(wǎng)絡(luò)公開度




書目名稱Cryptography and Coding網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cryptography and Coding被引頻次




書目名稱Cryptography and Coding被引頻次學(xué)科排名




書目名稱Cryptography and Coding年度引用




書目名稱Cryptography and Coding年度引用學(xué)科排名




書目名稱Cryptography and Coding讀者反饋




書目名稱Cryptography and Coding讀者反饋學(xué)科排名





作者: exceptional    時間: 2025-3-21 21:42
,On Efficient Decoding of Alternant Codes over a Commutative Ring?,Hensel lifting. (It is well-known that a finite local ring, such as a Galois ring, is a Hensel ring.) We characterize the . of monic minimal polynomials of a finite syndrome sequence over a Hensel ring (Theorem 3). It turns out that the monic minimal polynomials coincide modulo the maximal ideal . o
作者: 障礙    時間: 2025-3-22 02:45
The Political and Economic Backgroundall document such as a passport or ID card. We show that a step structure is measurably better than the original octal structure used in [.] when there are only a small number of bytes (20 to 30) in the photo-signature.
作者: Observe    時間: 2025-3-22 04:43

作者: 小木槌    時間: 2025-3-22 09:05
Some Applications of Bounds for Designs to the Cryptography,esign theory, especially bounding the optimal size of the designs and codes, to cryptography. We give a new bound for the parameter ., when (.)-resilient functions and correlation-immune functions of order . exist. In the last section we present analogous bound for the parameter . of .-wise independent t-resilient function.
作者: obsession    時間: 2025-3-22 14:22
A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System,al sets of a specified length, few have been identified with a structured method of generation such as Walsh codes and orthogonal Gold codes. The application of the new sequences discussed is orthogonal spreading codes in a synchronous code division multiple access (CDMA) system and their correlation properties are considered accordingly.
作者: obsession    時間: 2025-3-22 20:08
New Self-Dual Codes over GF(5),ing our method we constructed the following linear self-dual codes over GF(5):(i) [4,2,2], (ii) [8,4,4], (iii) [12,6,6], (iv) [16,8,6], (v) [20,10,8], (vi) [24,12,9], (vii) [28,14,10]. The codes (i), (ii), (iii), (v) are extremal. A [28,14,10] code is constructed here for the first time.
作者: Mediocre    時間: 2025-3-22 23:24
Enhanced Image Coding for Noisy Channels,ce and channel coding is shown to correct and restrict errors incurred during transmission over Additive White Gaussian Noise (AWGN) and Rayleigh Fading channels. The error correcting capability of the coding scheme also illustrated with compressed and uncompressed image transmission results which are comparable in terms of their visual quality.
作者: Pseudoephedrine    時間: 2025-3-23 02:54

作者: filicide    時間: 2025-3-23 07:03

作者: anchor    時間: 2025-3-23 11:52

作者: Pandemic    時間: 2025-3-23 17:32
The ACFTU, Labor Law, and Labor Reformit level. Trellis construction is based on Wolf’s method[.] and a binary systematic parity check matrix of RS codes is used for bit-level decoding[.]. In simulation results, it is shown that a hybrid of those two permutations can be used for low complexity decoding approaching maximum likelihood performance.
作者: Accede    時間: 2025-3-23 20:37
,Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics?,wo dimensional metrics and their parameters. We note that some examples of cyclotomic association schemes (which we call M schemes and H schemes respectively) fit properly as weakly metric schemes for these metrics.
作者: legislate    時間: 2025-3-24 00:58

作者: Commonplace    時間: 2025-3-24 06:08

作者: 對手    時間: 2025-3-24 07:35
The ACFTU, Labor Law, and Labor Reformesign theory, especially bounding the optimal size of the designs and codes, to cryptography. We give a new bound for the parameter ., when (.)-resilient functions and correlation-immune functions of order . exist. In the last section we present analogous bound for the parameter . of .-wise independent t-resilient function.
作者: ADJ    時間: 2025-3-24 11:00

作者: animated    時間: 2025-3-24 17:32
Labor Disputes and International Pressuresing our method we constructed the following linear self-dual codes over GF(5):(i) [4,2,2], (ii) [8,4,4], (iii) [12,6,6], (iv) [16,8,6], (v) [20,10,8], (vi) [24,12,9], (vii) [28,14,10]. The codes (i), (ii), (iii), (v) are extremal. A [28,14,10] code is constructed here for the first time.
作者: 變異    時間: 2025-3-24 20:06
Labor Disputes and International Pressuresce and channel coding is shown to correct and restrict errors incurred during transmission over Additive White Gaussian Noise (AWGN) and Rayleigh Fading channels. The error correcting capability of the coding scheme also illustrated with compressed and uncompressed image transmission results which are comparable in terms of their visual quality.
作者: 山崩    時間: 2025-3-24 23:51
Labor Disputes and International Pressuresate that the use of majority decoding can enhance the prior techniques in several ways. One enhancement allows the biometric authentication system to leak no information about a user’s biometric when using the proper computational assumptions. Another enhancement is a passive identification system.
作者: dysphagia    時間: 2025-3-25 04:48

作者: 聽覺    時間: 2025-3-25 11:07

作者: 蚊子    時間: 2025-3-25 11:44

作者: Feedback    時間: 2025-3-25 19:09

作者: opalescence    時間: 2025-3-25 20:58
The ACFTU, Labor Law, and Labor Reformn codes, secret sharing schemes, correlation-immune and resilient functions. In this paper we give applications of some methods and results from the design theory, especially bounding the optimal size of the designs and codes, to cryptography. We give a new bound for the parameter ., when (.)-resili
作者: FLIP    時間: 2025-3-26 03:51
The Political and Economic Background. In this paper we study the tradeoff between two such criteria, the nonlinearity and the resiliency. The results are twofold. Firstly, we establish the maximum nonlinearity for a fixed resiliency in certain cases. Secondly, we present a simple search algorithm for finding Boolean functions with goo
作者: 食品室    時間: 2025-3-26 06:46

作者: 乳白光    時間: 2025-3-26 12:02
The Political and Economic Backgroundollection of n sequences, of length n chips, that are mutually orthogonal. Although there are many possible combinations of sequences forming orthogonal sets of a specified length, few have been identified with a structured method of generation such as Walsh codes and orthogonal Gold codes. The appl
作者: ovation    時間: 2025-3-26 13:22

作者: 使絕緣    時間: 2025-3-26 18:41
The Political and Economic BackgroundEarth Orbit (LEO) satellite systems is the focus of the paper. The code-division-multiple-access (CDMA) format is emerging as a dominant air interface technology for cellular, personal-communications-services (PCS) as well as satellite installations. This transmission technology relies on a combinat
作者: 無瑕疵    時間: 2025-3-27 00:10

作者: 讓步    時間: 2025-3-27 01:40

作者: GROUP    時間: 2025-3-27 08:57

作者: 積習(xí)難改    時間: 2025-3-27 10:46

作者: 燒瓶    時間: 2025-3-27 14:18

作者: 純樸    時間: 2025-3-27 20:44
The Political and Economic Backgroundhold behaviour has been studied in many situations outside coding theory and a number of tools have been developped. One of those turns out to be particularly relevant to coding, namely the derivation of isoperimetric inequalities for product measures on Hamming spaces. we discuss this approach and
作者: vibrant    時間: 2025-3-27 23:57
The Political and Economic Backgroundhe rectangular complement operation. The notions of rectangular closure and basis were already defined. In this paper we represent a method to construct a rectangular basis of a linear code from a given linear basis.
作者: Radiculopathy    時間: 2025-3-28 04:04
The Political and Economic Backgroundr block error-control (detection and correction) codes. The representation of codes by means of graphs, and the corresponding graph-based decoding algorithms, are described briefly. Results on the performance of graph decoding methods for block codes of the array and generalised array type will be p
作者: 演繹    時間: 2025-3-28 06:30
The Political and Economic Backgroundally efficient algorithm to determine whether or not a time-varying convolutional encoder is catastrophic is derived. This algorithm is shown to be simpler than the catastrophicity test proposed by Balakirsky [.]. Furthermore, the algorithm can easily be generalised to rate . time-varying convolutio
作者: Encapsulate    時間: 2025-3-28 14:00

作者: 和平主義者    時間: 2025-3-28 18:27
The ACFTU, Labor Law, and Labor Reform codes. We also define a corresponding key equation and concentrate on decoding alternant codes when . is a domain or a local ring. Our approach is based on minimal realization (MR) of a finite sequence [.,.], which is related to rational approximation and shortest linear recurrences. The resulting
作者: 蕨類    時間: 2025-3-28 19:34

作者: HATCH    時間: 2025-3-28 23:54
The Political and Economic BackgroundDetermining the weight of Boolean functions is of exponential complexity. By using combinatorial results, it is proved that from their algebraic normal form (ANF), it is possible to have polynomial time results on the weight, for some classes of functions. As a result, the structure of the majority functions .. is given.
作者: angiography    時間: 2025-3-29 05:14
Applications of Exponential Sums in Communications Theory,We provide an introductory overview of how exponential sums, and bounds for them, have been exploited by coding theorists and communications engineers.
作者: diskitis    時間: 2025-3-29 11:06
Designs, Intersecting Families, and Weight of Boolean Functions,Determining the weight of Boolean functions is of exponential complexity. By using combinatorial results, it is proved that from their algebraic normal form (ANF), it is possible to have polynomial time results on the weight, for some classes of functions. As a result, the structure of the majority functions .. is given.
作者: LAY    時間: 2025-3-29 14:07

作者: 懶鬼才會衰弱    時間: 2025-3-29 18:01
An Encoding Scheme for Dual Level Access to Broadcasting Networks,irect-sequence spread spectrum communications are implemented to add specific information to the signal within the bandwidth allocated for broadcasting. This is beneficial to both the service providers and all subscribers in the network since the information added can advertise programmes which many are not yet authorised to access.
作者: confide    時間: 2025-3-29 23:34
An Overview of the Isoperimetric Method in Coding Theory (Extended Abstract) [Invited Paper],hold behaviour has been studied in many situations outside coding theory and a number of tools have been developped. One of those turns out to be particularly relevant to coding, namely the derivation of isoperimetric inequalities for product measures on Hamming spaces. we discuss this approach and derive consequences.
作者: gorgeous    時間: 2025-3-30 02:14
Rectangular Basis of a Linear Code,he rectangular complement operation. The notions of rectangular closure and basis were already defined. In this paper we represent a method to construct a rectangular basis of a linear code from a given linear basis.
作者: EXTOL    時間: 2025-3-30 04:29
Catastrophicity Test for Time-Varying Convolutional Encoders,ally efficient algorithm to determine whether or not a time-varying convolutional encoder is catastrophic is derived. This algorithm is shown to be simpler than the catastrophicity test proposed by Balakirsky [.]. Furthermore, the algorithm can easily be generalised to rate . time-varying convolutional encoders.
作者: COUCH    時間: 2025-3-30 11:38
Cryptography and Coding978-3-540-46665-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 猛擊    時間: 2025-3-30 13:35

作者: anesthesia    時間: 2025-3-30 18:09
The Political and Economic Background. In this paper we study the tradeoff between two such criteria, the nonlinearity and the resiliency. The results are twofold. Firstly, we establish the maximum nonlinearity for a fixed resiliency in certain cases. Secondly, we present a simple search algorithm for finding Boolean functions with good nonlinearity and some fixed resiliency.
作者: promote    時間: 2025-3-30 21:35

作者: Deduct    時間: 2025-3-31 03:52
The Political and Economic Backgroundhold behaviour has been studied in many situations outside coding theory and a number of tools have been developped. One of those turns out to be particularly relevant to coding, namely the derivation of isoperimetric inequalities for product measures on Hamming spaces. we discuss this approach and derive consequences.
作者: Synapse    時間: 2025-3-31 05:30
The Political and Economic Backgroundhe rectangular complement operation. The notions of rectangular closure and basis were already defined. In this paper we represent a method to construct a rectangular basis of a linear code from a given linear basis.
作者: 雜役    時間: 2025-3-31 10:24
The Political and Economic Backgroundally efficient algorithm to determine whether or not a time-varying convolutional encoder is catastrophic is derived. This algorithm is shown to be simpler than the catastrophicity test proposed by Balakirsky [.]. Furthermore, the algorithm can easily be generalised to rate . time-varying convolutional encoders.
作者: ONYM    時間: 2025-3-31 13:37
Michael WalkerIncludes supplementary material:
作者: Heart-Attack    時間: 2025-3-31 20:06

作者: 大洪水    時間: 2025-3-31 22:04
https://doi.org/10.1007/3-540-46665-7AES; Boolean Functions; Coding; Data Encryption; Decoding Algorithms; Error-Correcting Codes; Error-correc
作者: Atmosphere    時間: 2025-4-1 02:47

作者: 綠州    時間: 2025-4-1 08:01
Some Applications of Bounds for Designs to the Cryptography,n codes, secret sharing schemes, correlation-immune and resilient functions. In this paper we give applications of some methods and results from the design theory, especially bounding the optimal size of the designs and codes, to cryptography. We give a new bound for the parameter ., when (.)-resili
作者: ALE    時間: 2025-4-1 10:49
Further Results on the Relation Between Nonlinearity and Resiliency for Boolean Functions,. In this paper we study the tradeoff between two such criteria, the nonlinearity and the resiliency. The results are twofold. Firstly, we establish the maximum nonlinearity for a fixed resiliency in certain cases. Secondly, we present a simple search algorithm for finding Boolean functions with goo
作者: VOK    時間: 2025-4-1 15:46
,Combinatorial Structure of Finite Fields with Two Dimensional Modulo Metrics?,trics) and some group actions defined over them. We follow the well known approach of P. Delsarte [.] to this problem through the construction of association schemes. Association schemes based on this distances are the basic tools we propose to deal with the metric properties of codes defined over t
作者: foppish    時間: 2025-4-1 20:15
A New Method for Generating Sets of Orthogonal Sequences for a Synchronous CDMA System,ollection of n sequences, of length n chips, that are mutually orthogonal. Although there are many possible combinations of sequences forming orthogonal sets of a specified length, few have been identified with a structured method of generation such as Walsh codes and orthogonal Gold codes. The appl




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
交口县| 财经| 赤水市| 遂宁市| 乐至县| 宁阳县| 长治市| 巴林右旗| 民权县| 通山县| 册亨县| 石景山区| 漳州市| 图们市| 富锦市| 河间市| 衡水市| 扶风县| 弥勒县| 新宁县| 舒城县| 沙河市| 陕西省| 宁阳县| 称多县| 深泽县| 西峡县| 景宁| 溆浦县| 天祝| 乡城县| 大庆市| 江北区| 辽宁省| 安溪县| 武穴市| 合川市| 木里| 阿荣旗| 依兰县| 吴桥县|