Authentication-secrecy code based on conies over finite fields

来源 :中国科学:技术科学英文版 | 被引量 : 0次 | 上传用户:okey100
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
An authentication-secrecy code based on the rational normal curves over finite fields was constructed,whose probabilities of successful deception achieve their information-theoretic bounds.The set of encoding rules for this code is a representation system
其他文献
Using molecular dynamics with embedded-atom-type interatomicpotentials, we simulated the melting behavior of a spherical Ag3055 cluster coated with Ni. The semi
The effects of N+ implantation under various conditions on CVD diamond films were analyzed with Raman spectroscopy, four-point probe method, X-ray diffraction (
Global stability and instability of a class of discrete-time adaptive nonlinear control systems are investigated.The systems to be controlled are assumed to be
Carboxyl ion (COOH+) implantation was performed at 50 keV with different fluences for polypropylene. Hemocompatibility tests show that blood coagulation time an
The influences of different directional solidification processes, i.e., the high rate solidification(HRS) and liquid metal cooling(LMC), on microstructure and s
A new procedure is proposed to construct strongly nonlinear systems of multiple degrees of freedom subjected to parametric and/or external Gaussian white noises
新奇方法论为斯图尔特平行操纵者的工作区分析被介绍。工作区被定义那使描述能在位置的一个统一框架和活动站台的取向能力被成为。给活动站台的取向能力, piecewise 关上了答
The monitoring work was performed on soil erosion in Lizixi drainage area respectively in 1986 and 1999 by multiple methods with the information extracted from
The purpose of stochastic approximation (SA) is to find the roots of f(·) or the maximiz-er (minimizer) of L(·) when the unknown function f(·) or