Ternary Images of Self-Dual Codes and Cyclic Codes over F3 + vF3
By configuring an adequate set of messages obtained by an adversary and analyzing the information which can be obtained by an adversary, it is possible to verify the secrecy of crptography protocols.
Xuất bản năm: | Philippine computing journal 7, 2 (2012(D)). |
---|---|
Tác giả chính: | |
Định dạng: | Bài viết |
Ngôn ngữ: | English |
Những chủ đề: |