標(biāo)題: Titlebook: Geometries, Codes and Cryptography; G. Longo,M. Marchi,A. Sgarro Book 1990 Springer-Verlag Wien 1990 algebra.authentication.coding.coding [打印本頁] 作者: Addendum 時(shí)間: 2025-3-21 17:08
書目名稱Geometries, Codes and Cryptography影響因子(影響力)
書目名稱Geometries, Codes and Cryptography影響因子(影響力)學(xué)科排名
書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度
書目名稱Geometries, Codes and Cryptography網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Geometries, Codes and Cryptography被引頻次
書目名稱Geometries, Codes and Cryptography被引頻次學(xué)科排名
書目名稱Geometries, Codes and Cryptography年度引用
書目名稱Geometries, Codes and Cryptography年度引用學(xué)科排名
書目名稱Geometries, Codes and Cryptography讀者反饋
書目名稱Geometries, Codes and Cryptography讀者反饋學(xué)科排名
作者: 上流社會(huì) 時(shí)間: 2025-3-21 21:33
0254-1971 rcle geometry and applications to algebraic coding theory. The second part deals with unconditional secrecy and authentication, geometric threshold schemes and 978-3-211-82205-0978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706 作者: 完整 時(shí)間: 2025-3-22 03:29 作者: infringe 時(shí)間: 2025-3-22 08:27
Topics in Algebraic Coding Theoryon rate k/n but which nevertheless is capable to correct the expected number of symbol errors. Some coding bounds show, which compromises one has to accept, when designing an optimal coding system. The implementation of the encoder and decoder is facilitated, if the used code bears a mathematical st作者: 議程 時(shí)間: 2025-3-22 10:49 作者: 侵蝕 時(shí)間: 2025-3-22 16:45 作者: 侵蝕 時(shí)間: 2025-3-22 20:17 作者: 較早 時(shí)間: 2025-3-22 21:13 作者: 啟發(fā) 時(shí)間: 2025-3-23 04:04 作者: 物種起源 時(shí)間: 2025-3-23 08:36 作者: BRACE 時(shí)間: 2025-3-23 12:07 作者: liaison 時(shí)間: 2025-3-23 17:48 作者: 公司 時(shí)間: 2025-3-23 20:03 作者: Urea508 時(shí)間: 2025-3-24 00:46 作者: perimenopause 時(shí)間: 2025-3-24 06:17
An Introduction to the Theory of Unconditional Secrecy and AuthenticationA few insecure ciphers, a seemingly secure cipher and a provably secure ciphers are described to illustrate the basic points in Shannon-theoretic cryptography. Lower bounds for authentication codes in Simmons’ authentication theory are given.作者: Decline 時(shí)間: 2025-3-24 06:46 作者: Cupidity 時(shí)間: 2025-3-24 14:07
,Ein effektives Programmiermodell für ALVs,g. General concepts on Galois geometry and Steiner systems. The theory of h-sets in Steiner systems, with particular attention to Galois spaces. The theory of blocking sets, the even and odd type sets in a Steiner system. Applications to linear error correcting codes.作者: Daily-Value 時(shí)間: 2025-3-24 18:51
https://doi.org/10.1007/978-3-7091-3875-5threshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.作者: 征服 時(shí)間: 2025-3-24 21:47 作者: 懶洋洋 時(shí)間: 2025-3-25 01:11 作者: 和藹 時(shí)間: 2025-3-25 04:27 作者: 流出 時(shí)間: 2025-3-25 09:59
Applications of Finite Geometry to Cryptographythreshold schemes, network problems and WOM-codes. As geometric counterparts we shall nearly exclusively deal with projective spaces and their internal structures provided by, for example, linear subspaces, Baer subspaces, quadrics, etc.作者: 混合物 時(shí)間: 2025-3-25 13:17
Authentication / Secrecy Codesconditional secrecy due to Shannon [17] Simmons developed a theory of unconditional authentication [19]. In this paper we give some bounds and constructions for authentication/secrecy codes with splitting, based on finite geometry and combinatorics.作者: Generator 時(shí)間: 2025-3-25 16:36 作者: 反叛者 時(shí)間: 2025-3-25 20:32 作者: 反復(fù)無常 時(shí)間: 2025-3-26 00:26
Geometries, Codes and Cryptography978-3-7091-2838-1Series ISSN 0254-1971 Series E-ISSN 2309-3706 作者: Serenity 時(shí)間: 2025-3-26 06:07 作者: INCH 時(shí)間: 2025-3-26 12:19 作者: 搖曳 時(shí)間: 2025-3-26 13:57 作者: Rejuvenate 時(shí)間: 2025-3-26 18:15
Praktische Beobachtungen und Erfahrungen,sembled in two or more geometrical dimensions or directions, with emphasis on simple component codes and low complexity methods of decoding. Array codes were first discussed by Elias [31], and useful introductory references include [15,36,38,75,81]. The following books have significant sections devo作者: clarify 時(shí)間: 2025-3-26 21:35 作者: exostosis 時(shí)間: 2025-3-27 04:08 作者: 兇猛 時(shí)間: 2025-3-27 08:07 作者: gerontocracy 時(shí)間: 2025-3-27 11:03 作者: DEMN 時(shí)間: 2025-3-27 15:39 作者: Infant 時(shí)間: 2025-3-27 21:31 作者: Accede 時(shí)間: 2025-3-28 00:47
Praktische Beobachtungen und Erfahrungen,particularly where information symbols appear (or are constrained to be) in geometrical patterns (e.g., tapes, cards, discs, chips, etc.). The two main fields of application are in communications systems and for information storage systems.作者: TEM 時(shí)間: 2025-3-28 05:35 作者: 方舟 時(shí)間: 2025-3-28 09:44 作者: 可憎 時(shí)間: 2025-3-28 10:25 作者: GOUGE 時(shí)間: 2025-3-28 18:21