A class of Hamming weight of linear codes with dimension5

来源 :第八届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:cocoxb
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  The weight hierarchy of a linear [n,k;q] code C over Fq is the sequence (d1,d2,…dk ),where dris the smallest support weight of a r-dimensional subcode of C.In this paper,by using the finite projective geometry method,we research a class of weight hierarchy of linear codes with dimension 5.We find some new necessary conditions of this class.Then we divide the weight hierarchies of this class into six subclasses,and we research one subclass and determine almost all weight hierarchies of this subclass of weight hierarchies of linear codes with dimension 5.
其他文献
Javascript是Web应用中使用最广泛的客户端脚本语言,基于Javascript脚本的恶意网页利用浏览器和客户端应用程序存在的漏洞执行恶意Javascript代码,这会导致用户的隐私泄露等安全问题.为了有效检测恶意网页,本文提出了一种基于Javascript代码基本词特征的轻量级分析方法.首先通过Javascript代码提取出基本词,然后利用最近邻(K-NN)、主成分分析(PCA)、支持向量
针对嵌入式平台功耗低、资源少等特点,设计了适用于嵌入式平台的可信芯片及嵌入式软件栈,构建了嵌入式可信计算平台.为使嵌入式可信计算平台能够有效地为嵌入式应用提供可信功能支持,本文设计并实现了嵌入式可信计算平台测评系统,从应用服务角度出发,保证嵌入式应用调用的可信功能的正确性.该测评系统支持多个平台的并行测试,并能根据不同需求定制测试方案,支持测试报表分析测试结果,且引起的平台额外开销较小.
The security policy can exactlv reflect the security expectations of svstem models Besides.it is also an important method of remote attestation of computing environment.which is based on model behavio
Privacy-preserving data publication problem has attracted more and more attention in recent years.A lot of related research works have been done towards dataset with single sensitive attribute.However
会议
The lightweight mask scheme is a new tendency of the mask countermeasures.With this scheme,we propose several profiled and non-profiled power analyses against the RSM and RSM-Like schemes in the DPA C
In this paper,we propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified.Besides,we can adjust the maximum tampered rate a
能量分析攻击实施的依据是密码设备的能量消耗依赖于设备所执行的密码算法的中间值。因此,如果试图抵御这种攻击,就要降低甚至消除这种依赖性。布尔掩码技术为目前最为流行的防御措施。针对带循环S盒掩码的AES密码芯片,提出了一种新的相关性功耗攻击方法.该方法首先利用方差分析找出明文盲化和S盒计算的时间点,然后通过比较盲化后的字节的汉明重量和实际测量功耗值的相关系数恢复掩码,最后针对S盒输入和输出的汉明距离进
Dependability analysis is an important step in designing and analyzing safety computer systems and protection systems.Introducing multi-processor and virtual machine increases the system faults comple
In the harsh environment where node density is sparse.the slow-moving nodes cannot effectivelv utilize the encountering opportunities to realize the self-organized identity authentications.and do not
访问控制策略是网络安全防范和保护的主要策略,其任务是保证网络资源不被非法使用和非法访问。针对静态职责策略与可用策略并存时由于互斥的安全与可用需求可能引发访问控制策略不一致性冲突问题,提出了一种优化的冲突消解方法.该方法基于静态裁剪减少所需考虑的策略数量;通过计算最小冲突覆盖集合以降低问题求解的规模;度量删除每一个静态职责分离策略和可用策略所引发的安全性与可用性损失,并以此评估各个冲突消解方案的优先