搜索结果: 1-15 共查到“amplification”相关记录128条 . 查询时间(0.093 秒)
Amplification of early drought responses caused by volatile cues emitted from neighboring tea plants
VOCs NCED ABA 茶树
2023/4/19
Plants have developed sophisticated mechanisms to survive in dynamic environments. Plants can communicate via volatile organic compounds (VOCs) to warn neighboring plants of threats. In most cases, VO...
Rapid and visual detection of 2019 novel coronavirus (SARS-CoV-2) by a reverse transcription loop-mediated isothermal amplification assay
SARS-CoV-2 RT-LAMP COVID-19 Detection Visual
2020/6/12
To evaluate a reverse transcription loop-mediated isothermal amplification (RT-LAMP) assay for detection of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), and compare it with RT-PCR.
Detection of Klebsiella pneumonia in respiratory tract samples by the loop-mediated isothermal amplification method
环介导等温扩增技术 呼吸道感染 肺炎克雷伯菌 细菌培养法 DNA测序技术
2021/3/29
建立环介导等温扩增技术(loop-mediated isothermal amplification,LAMP)检测呼吸道感染患者痰液中肺炎克雷伯菌(Klebsiella pneumoniae,Kpn)的方法并进行初步应用。 方法:基于Kpn phoE基因设计4条特异性引物,对反应条件中的Mg2+和甜菜碱浓度进行优化,建立检测Kpn LAMP方法并进行特异性和灵敏度试验;收集308例呼吸道感染患...
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge
NIZK Security Amplification
2019/6/4
We develop novel techniques to leverage the use of leakage simulation lemma (Jetchev-Peitzrak TCC 2014) to argue amplification. A crucial component of our result is a new notion for secret sharing NPN...
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
PFG iO
2019/6/4
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, significantly expanding the scope of problems amenable to cryptographic study. All known approaches to cons...
Theoretical and Practical Approaches for Hardness Amplification of PUFs
Hardness Amplification Complexity Theory FPGA Security
2019/5/23
The era of PUFs has been characterized by the efforts put into research and the development of PUFs that are robust against attacks, in particular, machine learning (ML) attacks. In the lack of system...
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries
Privacy Amplification Non-malleable extractors Quantum Cryptography
2019/3/1
privacy amplification, two mutually trusted parties aim to amplify the secrecy of an initial shared secret X in order to establish a shared private key K by exchanging messages over an insecure commun...
Error Amplification in Code-based Cryptography
post-quantum cryptography MDPC timing attack
2019/1/2
Code-based cryptography is one of the main techniques enabling cryptographic primitives in a post-quantum scenario. In particular, the MDPC scheme is a basic scheme from which many other schemes have ...
Privacy Amplification from Non-malleable Codes
Non-malleability Privacy Amplification Information-theoretic Key Agreement
2018/3/29
In this paper, we connect two interesting problems in the domain of Information-Theoretic Cryptography: "Non-malleable Codes" and "Privacy Amplification". Non-malleable codes allow for encoding a mess...
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations
Communication Complexity Conditional Disclosure of Secrets Amplification
2017/2/24
In the \emph{conditional disclosure of secrets} problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold inputs xx and yy respectively, wish to release a common secret ss to Carol...
Simultaneous Secrecy and Reliability Amplification for a General Channel Model
channel secrecy reliability
2016/12/10
We present a general notion of channel for cryptographic purposes, which can model either a (classical) physical channel or the consequences of a cryptographic protocol, or any hybrid. We consider {\e...
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification
hardware trojan horses secure multiparty computations
2016/12/8
Security against hardware trojans is currently becoming an essential ingredient to ensure trust in information systems. A variety of solutions have been introduced to reach this goal, ranging from rea...
Erasable memory is an important resource for designing practical cryptographic protocols that are secure against adaptive attacks. Many practical memory devices such as solid state drives, hard disks,...
Association Between Amplification and Expression of C-MYC Gene and Clinicopathological Characteristics of Stomach Cancer
C-MYC Chromogenic In Situ hybridization (CISH) Immunohistochemistry (IHC)
2016/1/26
Background: The incidence rate of gastric cancer in western countries has shown a remarkable decline in the recent years while it is still the most common cancer among males in Iran. The proto-oncogen...