>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到知识库 Power相关记录1265条 . 查询时间(0.111 秒)
Baseball players need to be explosive and powerful to throw, hit, jump, run, and change directions. This is so important it has to consistently be addressed in a baseball player’s training. While it i...
If you want to be the best soccer player possible, you need rotational power.While I am all for Squats, Lunge variations, Pull-ups, Push-ups and Deadlifts for building maximal strength, I believe rota...
Today, football, hockey, rugby teams, etc., use martial arts training in their practice sessions. It is highly effective because you learn to leverage your opponent in martial arts like Jeet Kung Do (...
This paper is focused on an open question regarding the correlation and the power of NIST statistical test suite. If we found some correlation between these statistical tests, then we can improve the ...
This paper presents an efficient algorithm for computing 11th11th-power residue symbols in the cyclotomic field Q(ζ11)Q(ζ11), where ζ11ζ11 is a primitive 11th11th root of unity. It extends an earlier ...
Embedded microprocessors are an important component of reconfigurable architectures. Fine-grain (e.g., cycle-accurate) power analysis of such processors has been used to improve power and energy effic...
Side-channel power analysis is a powerful method of breaking secure cryptographic algorithms, but typically power analysis is considered to require specialized measurement equipment on or near the dev...
This paper generalizes the notable Galbrath's test by introducing the general reciprocity law on function fields. With the help of the extended Galbrath's test, we show the scheme of Boneh, LaVigne an...
评价双腔Power PICC置管部位医用粘胶剂相关性皮肤损伤的风险预防管理效果。方法 将2015年1月—2017年12月我院外科置入耐高压注射型双腔Power PICC患者156例,按时间顺序分为对照组85例,干预组71例。对照组采用常规护理方案预防皮肤损伤;干预组在对照组的基础上实施风险评估、风险防护及风险管理的一系列预防措施,比较2组患者医用粘胶剂相关性皮肤损伤的发生率。
In the era of lightweight cryptography, designing cryptographically good and power efficient 4x4 S-boxes is a challenging problem. While the optimal cryptographic properties are easy to determine, ver...
Braid groups are infinite non-abelian groups naturally arising from geometric braids that have been used in cryptography for the last two decades. In braid group cryptography public braids often conta...
The current practice in board-level integration is to incorporate chips and components from numerous vendors. A fully trusted supply chain for all used components and chipsets is an important, yet ext...
Profiled side-channel attacks based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that ...
Quantum computing threatens conventional public-key cryptography. In response, standards bodies such as NIST increasingly focus on post-quantum cryptography. In particular, hash-based signature scheme...
The static power consumption of modern CMOS devices has become a substantial concern in the context of the side-channel security of cryptographic hardware. Its continuous growth in nanometer-scaled te...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...