>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到block相关记录529条 . 查询时间(0.109 秒)
Eletronuclear said it was seeking a "constructive dialogue" with the municipal government after it was ordered to stop work on Angra 3 - a unit whose construction only resumed in November after a seve...
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers ...
Current blockchains are restricted by the low throughput. Aimed at this problem, we propose Txilm, a protocol that compresses the size of transaction presentation in each block and thus saves the band...
Right from its introduction by Boneh et al., fault attacks (FA) have been established to be one of the most practical threats to both public key and symmetric key based cryptosystems. Statistical Inef...
This paper presents CONCRETE (Commit-Encrypt-Send-the-Key) a new Authenticated Encryption mode that offers CIML2 security, that is, ciphertext integrity in the presence of nonce misuse and side-channe...
Tweakable block cipher (TBC), a stronger notion than standard block ciphers, has wide-scale applications in symmetric-key schemes. At a high level, it provides flexibility in design and (possibly) bet...
对比分析MS BLOCK T1rho、MS HS8 T1rho及3D BLOCK T1rho序列肝脏MR图像质量及T1rho值。方法 分别采用MS BLOCK T1rho(n=33)、MS HS8 T1rho(n=34)及3D BLOCK T1rho(n=22)序列对40名成年健康志愿者行腹部MR扫描,比较3种序列肝脏图像质量及T1rho值,以Pearson相关分析观察3种序列T1rho值的相关性...
Using a small block length is a common strategy in designing lightweight block cipher. So far, many 64-bit primitives have been proposed. However, if we use such a 64-bit primitive for an authenticate...
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, ...
Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryp...
探讨生长发育高峰期患者功能矫治后上颌切牙位移及牙槽骨改建情况。方法:选择使用高位头帽肌激动器(HGAC)和Twin-block功能矫治器矫治成功的30例骨性Ⅱ类下颌骨后缩患者为研究对象,根据使用矫治器的不同将其分为HGAC组和Twin-block组,每组15例患者。治疗前及治疗后分别拍摄锥形束CT(CBCT),观察上颌中切牙在牙槽骨内的相对位置变化及牙槽骨改建情况。采用SPSS 20.0 软件包对...
研究非小细胞肺癌螺旋断层放疗计划设计中应用Block降低肺低剂量区的方法。 方法:选取20例非小细胞肺癌病例,对每例病例勾画保护区域作为Block,并按以下3种不同的Block设置方式设计放疗计划。第I组采用Unblock方式,第II组采用Directional Block方式,第III组采用Complete Block+Directional Block方式。优化结果满足靶区和危及器官剂量限值后...
We introduce a new technique for compressing the public keys of the UOV signature scheme that makes use of block-anti-circulant matrices. These matrices admit a compact representation as for every blo...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to securely execute RAM programs over data that is stored in an untrusted server. Distributed Oblivious RAM is a variant of ORAM,...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...