>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到Separations相关记录30条 . 查询时间(0.093 秒)
The complexity of collision-resistant hash functions has been long studied in the theory of cryptography. While we often think about them as a Minicrypt primitive, black-box separations demonstrate th...
We are organizing the 17th Asia-Pacific International Symposium on Microscale Separation and Analysis (APCE 2017) from November 10-13 2017 at Songjiang New Century Grand Hotel (Shanghai, China). The s...
Membrane technology has been implemented in many fields as energy-saving and sustainable process. Water in great part of the world is provided by seawater desalination using reverse osmosis membrane p...
In the \emph{conditional disclosure of secrets} problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold inputs xx and yy respectively, wish to release a common secret ss to Carol...
We address the problems of whether t-circular-secure encryption can be based on (t-1)-circular-secure encryption or on semantic (CPA) security, if t = 1. While for t = 1 a folklore construction, based...
In this paper we provide new algebraic tools to study the relationship between different Matrix Diffie-Hellman (MDDH) Problems, which are recently introduced as a natural generalization of the so-call...
Separating public key encryption from one way functions is one of the fundamental goals of complexity-based cryptography. Beginning with the seminal work of Impagliazzo and Rudich (STOC, 1989), a sequ...
For encryption schemes, key dependent message (KDM) security requires that ciphertexts preserve secrecy even when the encrypt messages may depend on the secret keys. While KDM security has been extens...
Brownian ratchets use a time-varying asymmetric potential that can be applied to separate diffusing particles or molecules. A new type of Brownian ratchet, a geometrical Brownian ratchet, has been rea...
It is well known that the random oracle model is not sound in the sense that there exist cryptographic systems that are secure in the random oracle model but when instantiated by any family of hash ...
We study the maximal achievable accuracy of distributed differentially private protocols for a large natural class of boolean functions, in the computational setting.
While standard notions of security suffice to protect any message supplied by an adversary, in some situations stronger notions of security are required. One such notion is n-circular security, where ...
This paper establishes a new fact about the compositional changes in the pool of unemployed over the U.S. business cycle and evaluates a number of theories that can potentially explain it. Using micro...
In the years 2003-2008 the Russian economy experienced a period of strong and sustained growth, which was accompanied by large worker turnover and rising informality. We investigate whether the burden...
We present spatially resolved photometric and spectroscopic observations of two wide brown dwarf binaries uncovered by the SIMP near-infrared proper motion survey. The first pair (SIMP J1619275+031350...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...