首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 51 毫秒
1.
AConstructionofCartesianAuthenticationCodesfromVectorSpaceandDualAuthenticationCodesFengRongquan(冯荣权)(DepartmentofMathematics...  相似文献   

2.
赵辉芳  南基洙 《东北数学》2007,23(2):123-131
In this paper, we determine the normal forms of idempotent matrices for similarity over finite local rings Z/p^kZ, from which we construct a Cartesian authentication code and compute its size parameters and the probabilities of successful impersonation and substitution attack under the hypothesis that the cecoding rules are chosen according to a uniform probability distribution.  相似文献   

3.
4.
5.
The idea to consider different unions of points, lines, planes, etc., is rather old. Many important configurations of such kinds are geometric (or matroidal) lattices. In this work, we study Desargues, Pappus, and Pasch configurations in D-semimodular lattices.  相似文献   

6.
In this paper, we mainly investigate some properties of meromorphic solutions for several q-difference equations, which can be seen as the q-difference analogues of Painlevé equations. Some results about the existence and the estimates of growth of meromorphic solution f for q-difference equations are obtained, especially for some estimates for the exponent of convergence of poles of ?_qf(z) := f(qz)-f(z), which extends some previous results by Qi and Yang.  相似文献   

7.
A Riesz space K1 whose elements are pairs of convex-set collections is presented for the study on the calculus of generalized quasi-differentiable functions.The space K1 is constructed by introducing a well-defined equivalence reation among pairs of collections of convex sets .Some important properties on the norm and operations is K1 are given.  相似文献   

8.
In this note, we construct some new harmonic maps from ℝ m to ℍ m via symmetric methods. Supportedb y NSF Postdoctoral Research Fellowship, China, and MCSEC.  相似文献   

9.
10.
Stability of Periodic Solutions Generated by Hopf Points Emanating from a Z_2-symmetry-breaking Takens-Bogdanov PointWuWei(吴微...  相似文献   

11.
§1.IntroductionLetS,EandMbethreenon-emptyfinitesetsandletf:S×E→Mbeamap.Thefourtuple(S,E,M;f)iscaledanauthenticationcode(see[1...  相似文献   

12.
§1.IntroductionLetS,EandMbethreenon-emptysetsandletf:S×E→Mbeamap.Thefourtuple(S,E,M;f)iscaledanauthenticationcode(see[1]),if(...  相似文献   

13.
本文利用辛几何构作了两类 Cartesian认证码 ,计算了码的参数 .当编码规则按等概率分布选取时 ,计算出敌方成功的模仿攻击概率和成功的替换攻击概率  相似文献   

14.
利用有限域上2-幂零矩阵构作Cartesian认证码   总被引:2,自引:0,他引:2  
李殿龙  郑宝东 《应用数学》2004,17(3):383-388
给出 2 -幂零矩阵的Jordan标准型在相似变换下的稳定群的结构 ,利用有限域上 2 -幂零矩阵构作了一个Cartesian认证码 ,计算出了该认证码的参数 .在假定编码规则按等概率分布选取的条件下 ,计算出了该认证码被成功的模仿攻击的最大概率PI 及被成功的替换攻击的最大概率PS.  相似文献   

15.
利用有限域上伪辛几何构作两类Cartesian认证码   总被引:5,自引:0,他引:5  
本文利用有限域上的伪辛几何构作了两类Cartesian认证码,并且计算了它们的参数及成功的模仿攻击概率和成功的替换攻击概率.  相似文献   

16.
利用伪辛空间上一类子空间m维(m,0,0,0)型子空间的性质构作了d~e析取矩阵M_q(2v+1,m,d),并利用子空间的计数定理计算了它的参数.通过研究N(m,0,0,0;2v+1)的单调性,得到了矩阵M_q(2v+1,m,d)的最优值.  相似文献   

17.
18.
This paper provides new combinatorial bounds and characterizations of authentication codes (A-codes) and key predistribution schemes (KPS). We first prove a new lower bound on the number of keys in an A-code without secrecy, which can be thought of as a generalization of the classical Rao bound for orthogonal arrays. We also prove a new lower bound on the number of keys in a general A-code, which is based on the Petrenjuk, Ray-Chaudhuri and Wilson bound for t-designs. We also present new lower bounds on the size of keys and the amount of users' secret information in KPS, the latter of which is accomplished by showing that a certain A-code is hiding inside any KPS.  相似文献   

19.
利用有限域上酉几何构作两类Cartesian认证码   总被引:19,自引:0,他引:19  
本文利用有限域上的酉几何构作了两类Cartesian认证码,并且计算了它们的参数及成功的模仿攻击概率和成功的替换攻击概率。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号