共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
We study the geometry of point-orbits of elation groups with a given center and axis of a finite projective space. We show that there exists a 1-1 correspondence from conjugacy classes of such groups and orbits on projective subspaces (of a suitable dimension) of Singer groups of projective spaces. Together with a recent result of Drudge [7] we establish the number of these elation groups. 相似文献
3.
利用奇、偶特征有限域上的正交几何构作出一类C artesian认证码,并且计算了它们的参数.并在假定按照等概率分布来选择编码规则下,求出了认证码的成功的模仿攻击概率和成功的替换攻击概率.作为一个推论,还得到了一些最优的C artesian认证码. 相似文献
4.
We obtain, in principle, a complete classification of all long inextendable binary linear codes. Several related constructions and results are presented. 相似文献
5.
Curtis Greene 《Studies in Applied Mathematics》1976,55(2):119-128
The problem of computing the weight distribution of a linear code is proved to be a special case of the problem of finding the Tutte polynomial (or generalized dichromatic polynomial) of a combinatorial geometry. Many other connections between the two fields are discussed. 相似文献
6.
利用有限域上酉几何构作一类新的带仲裁的认证码,并且计算了所构作认证码的参数以及各种攻击成功的概率. 相似文献
7.
A construction of authentication codes with arbitration from singular pseudo-symplectic geometry over finite fields is given and the parameters of the code are computed. Under the assumption that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of success for different types of deceptions are also computed. 相似文献
8.
利用有限域上奇异伪辛几何构作了一个新的具有仲裁的认证码,计算了这个码的参数,当发方编码规则和收方解码规则按等概率分布选取时,计算出各种攻击成功的概率. 相似文献
9.
Corrado Zanella 《Designs, Codes and Cryptography》1998,13(2):199-212
In this paper we deal with authentication systems in which one key is used to authenticate many source states. We answer a related question on the cardinalities of the intersections of quadrics in PG (d,q). We first generalize a class of geometric authentication systems, which has been introduced by Beutelspacher, Tallini and Zanella4. The source states are the lines through a special point N of PG (d,q) (the d-dimensional projective space over GF (q)). The keys are some hypersurfaces which have N as a nucleus ( N is a nucleus of if every line through N meets in exactly one point). The message belonging to a source state and a key is the unique point of intersection of the line with the hypersurface . We give the values of s for which the constructed authentication systems have a security which is comparable to the best allowed by a theoretical bound. In case the hypersurfaces are quadrics, we give further results on the security. To this end, we determine the greatest cardinality for the intersections of the finite Veronese varieties with the projective subspaces of any given dimension. Finally, we discuss a possible implementation. 相似文献
10.
11.
12.
13.
Finite Projective Geometries and Classification of the Weight Hierarchies of Codes (Ⅰ) 总被引:1,自引:0,他引:1
WenDeCHEN TorleivKLφVE 《数学学报(英文版)》2004,20(2):333-348
The weight hierarchy of a binary linear [n,κ] code C is the sequence (d1,d2,...,dκ), where dr is the smallest support of an r-dimensional subcode of C. The codes of dimension 4 are collected in classes and the possible weight hierarchies in each class is determined by finite projective geometries.The possible weight hierarchies in class A, B, C, D are determined in Part (Ⅰ). The possible weight hierarchies in class E, F, G, H, I are determined in Part (Ⅱ). 相似文献
14.
In this paper, a construction of optimal constant composition codes is developed, and used to derive some series of new optimal
constant composition codes meeting the upper bound given by [13]. 相似文献
15.
A classification is given of some optimal ternary linear codes of small length. Dimension 2 is classified for every minimum distance. Dimension 3, 4 and 5 is classified up to minimum distance 12. For higher dimension a classification is given where possible. 相似文献
16.
利用有限域上的向量空间的子空间作了一个A~2-码,并计算了该码的参数.在假定发方编码规则和收方解码规则按等概率分布选取时,计算了各种攻击成功的概率. 相似文献
17.
Wei Hongzeng 《数学年刊B辑(英文版)》1983,4(3):299-306
In this paper the author considers the n-dimensional(n≥3)unitary geometry overfinite field F_(q~2),where q is a power of a prime,The author takesthe set of all one-dimensionalnon-isotropic subspaces as the set of treatments,and obtainsan association scheme and PBIBdesigns with q associate classes,whose parameters are also computed. 相似文献
18.
In this paper, we obtain some new results on the existence of MDS self-dual codes utilizing (extended) generalized Reed-Solomon codes over finite fields of odd characteristic. For finite field with odd characteristic and square cardinality, our results can produce more classes of MDS self-dual codes than previous works. 相似文献
19.
A k-track in PG(n,q) is a set of k points such that every n of them are in general position. Here, we construct a class of n-tracks arising from algebraic curves. 相似文献
20.