搜索结果: 1-15 共查到“知识库 Complete”相关记录259条 . 查询时间(0.129 秒)
Combining ability from complete diallel design of Camellia oleifera: Implications for the utility of GCA and SCA in oil-related traits breeding
油茶 油脂性状 遗传差异
2024/5/10
A Complete Transcriptional Landscape Analysis of Pinus elliottii Engelm. Using Third-Generation Sequencing and Comparative Analysis in the Pinus Phylogeny
Pinus elliottii Transcriptional Landscape Analysis Pinus Phylogeny
2023/6/5
A Complete and Efficient Key Mismatch Attack on NIST Candidate NewHope
key encapsulation mechanism NIST Candidate NewHope
2019/4/29
In CT-RSA 2019, Bauer et al. have analyzed the case when the public key is reused for the NewHope key encapsulation mechanism (KEM), a second-round candidate in the NIST Post-quantum Standard process....
A COMPLETE FRAMEWORK OPERATING SPATIALLY-ORIENTED RTI IN A 3D/2D CULTURAL HERITAGE DOCUMENTATION AND ANALYSIS TOOL
3D visualization RTI imaging Close-Range Photogrammeytry web visualization
2019/3/4
Close-Range Photogrammetry (CRP) and Reflectance Transformation Imaging (RTI) are two of the most used image-based techniques when documenting and analyzing Cultural Heritage (CH) objects. Nevertheles...
Degree 2 is Complete for the Round-Complexity of Malicious MPC
foundations Multi-Party Computation
2019/3/1
We show, via a non-interactive reduction, that the existence of a secure multi-party computation (MPC) protocol for degree-22 functions implies the existence of a protocol with the same round complexi...
Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker
Provable security Computationally complete symbolic attacke Vote privacy
2018/6/25
We analyze the FOO electronic voting protocol in the provable secu- rity model using the technique of Computationally Complete Symbolic Attacker (CCSA). The protocol uses commitments, blind signatures...
Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage
RLWE key exchange post quantum
2017/12/13
Key Exchange (KE) from RLWE (Ring-Learning with Errors) is a potential alternative to Diffie-Hellman (DH) in a post quantum setting. Key leakage with RLWE key exchange protocols in the context of key ...
BUILDING A COMPLETE FREE AND OPEN SOURCE GIS INFRASTRUCTURE FOR HYDROLOGICAL COMPUTING AND DATA PUBLICATION USING GIS.LAB AND GISQUICK PLATFORMS
GIS Open Source Free Software Deployment Hydrology GIS.lab Gisquick
2017/8/10
Building a complete free and open source GIS computing and data publication platform can be a relatively easy task. This paper describes an automated deployment of such platform using two open source ...
Complete Reversion of Cardiac Functional Adaptation Induced by Exercise Training
PHYSIOLOGICAL HYPERTROPHY DETRAINING PRESSURE–VOLUME ANALYSIS FUNCTIONAL REVERSIBILITY
2018/4/24
Purpose Long-term exercise training is associated with characteristic cardiac adaptation, termed athlete's heart. Our research group previously characterized in vivo left ventricular (LV) function of ...
On the Security of Practical and Complete Homomorphic Encrypted Computation
foundations Encrypted Computation
2017/1/3
Security with respect to the operator as an adversary is considered for processors supporting unbounded general purpose homomorphic encrypted computation. An efficient machine code architecture is def...
Implementing Complete Formulas on Weierstrass Curves in Hardware
Elliptic curve cryptography FPGA Weierstrass curves
2016/12/12
This work revisits the recent complete addition formulas for prime order elliptic curves of Renes, Costello and Batina in light of parallelization. We introduce the first hardware implementation of th...
INTEGRATING SMARTPHONE IMAGES AND AIRBORNE LIDAR DATA FOR COMPLETE URBAN BUILDING MODELLING
Smartphone Images Airborne LiDAR Building Reconstruction Registration
2016/11/11
A complete building model reconstruction needs data collected from both air and ground. The former often has sparse coverage on building façades, while the latter usually is unable to observe the...
COMBINATION OF TLS POINT CLOUDS AND 3D DATA FROM KINECT V2 SENSOR TO COMPLETE INDOOR MODELS
Data combination TLS point cloud Kinect v2 Indoor 3D modeling Building elements
2016/11/11
The combination of data coming from multiple sensors is more and more applied for remote sensing issues (multi-sensor imagery) but also in cultural heritage or robotics, since it often results in incr...
PUBLISHING PLATFORM FOR AERIAL ORTHOPHOTO MAPS, THE COMPLETE STACK
drone eBee aerial photos evaluation surface situation map engineering networks road register publishing map application stack cloud
2016/11/8
When creating set of orthophoto maps from mosaic compositions, using airborne systems, such as popular drones, we need to publish results of the work to users. Several steps need to be performed in or...
High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem
ECDL problem Semaev polynomials block ciphers
2016/7/20
One of the key questions in contemporary applied cryptography is whether there exist an efficient algorithm for solving the discrete logarithm problem in elliptic curves. The primary approach for this...