>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到non linear相关记录192条 . 查询时间(0.281 秒)
近日,数学学院2019级硕士研究生舒希超收到了来自理论计算机领域顶级会议SODA(ACM-SIAM Symposium of Discrete Algorithms)的论文录用信。舒希超与美国罗德岛大学的韩杰研究员和山大数学学院的王光辉教授合作的论文《Non-linear Hamilton cycles in linear quasi-random hypergraphs》将发表在2021年1月的...
In this paper, we present new preimage attacks on KECCAK-384 and KECCAK-512 for 2, 3 and 4 rounds. The attacks are based on non-linear structures (structures that contain quadratic terms). These struc...
In this paper we study cryptanalysis with non-linear polynomials cf. Eurocrypt’95 (adapted to Feistel ciphers at Crypto 2004). Previously researchers had serious difficulties in making such attacks wo...
LowMC is a block cipher family that is optimized for practical instantiations of multi-party computation, fully homomorphic encryption, and zero-knowledge proofs. It was designed in 2015 by Albrecht e...
The Rational Function Model (RFM) is a non-linear model. Usually, the RFM-based satellite image block adjustment uses the Taylor series to expand error equations, and then solves the linear model. The...
Abstract. We investigate the security of a public-key encryption scheme, the Indeterminate Equation Cryptosystem (IEC), introduced by Akiyama, Goto, Okumura, Takagi, Nuida, and Hanaoka at SAC 2017 as ...
In this paper, we propose a post-quantum public-key encryption scheme whose security depends on a problem arising from a multivariate non-linear indeterminate equation. The security of lattice cryptos...
In image processing, algorithms for object classification are typically based around machine learning. From the algorithm developer's perspective, these can involve a considerable amount of effort and...
In this paper, we propose a reduction technique that can be used to determine the density of IV terms of a complex multivariable boolean polynomial. Using this technique, we revisit the dynamic cube a...
In recent years, methods to securely mask S-boxes against side-channel attacks by representing them as polynomials over finite binary fields have become quite efficient. A good cost model for this is ...
In this paper, we present new adaptively secure identity-based encryption (IBE) schemes. One of the distinguishing property of the schemes is that it achieves shorter public parameters than previous s...
Multiple sensors are used in a variety of geolocation systems. Many use Time Difference of Arrival (TDOA) or Received Signal Strength (RSS) measurements to estimate the most likely location of a signa...
This paper describes a simple orbital picture for understanding the optical transitions and the second-order nonlinear optical response of metallocene-based chromophores of the form metallocene-(pi-br...
Velvet maple (Acer velutinum) is one of the woody species in the Hyrcanian forests. In this study, the relationship between height and diameter of velvet maple was surveyed. A complete list of the sel...
A great deal of evidence demonstrates that state-based aspects of human functioning,such as moment-to-moment variation in affect, explain important psychological and behavioural outcomes (e.g., Colaut...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...