>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到bound相关记录334条 . 查询时间(0.93 秒)
We demonstrate the preparation and unique properties of composite vitrimer-like materials containing silica nanoparticles (SNPs). The matrix is composed of polyacrylate-based polymers crosslinked via ...
【分析化学学术报告】Mass Spectrometric detection of membrane-bound proteins and their noncovalent interaction partners
We focus on numerical study of the dynamical Ginzburg-Landau equations under the temporal gauge, and propose a decoupled numerical scheme based on the finite element method. For the variable A, the se...
A new class of high-order maximum principle preserving numerical methods is proposed for solving the semilinear Allen-Cahn equation. We start with the method consists of a $k$th-order multistep expone...
The free, esterified and bound forms of 37 phenolic compounds (including hydroxybenzoic acid, hydroxycinnamic acids, flavanols, flavonols and flavones) from walnut kernel (Juglans regia L.) were inves...
Timed-release encryption allows senders to send a message to a receiver which cannot decrypt until a server releases a time bound key at the release time. The release time usually supposed to be known...
We show that Legendre PRF, recently suggested as an MPC-friendly primitive in a prime field ZpZp, admits key recovery attacks of complexity O(p√)O(p) rather than previously assumed O(p)O(p). We also d...
We give a 4-list algorithm for solving the Elliptic Curve Discrete Logarithm (ECDLP) over some quadratic field Fp2Fp2. Using the representation technique, we reduce ECDLP to a multivariate polynomial ...
The contribution vector (convec) of a secret sharing scheme is the vector of all share sizes divided by the secret size. A measure on the convec (e.g., its maximum or average) is considered as a crite...
The combination of universal hashing and encryption is a fundamental paradigm for the construction of symmetric-key MACs, dating back to the seminal works by Wegman and Carter, Shoup, and Bernstein. W...
华南理工大学数据结构与算法课件Chapter15 Branch and Bound Method
Encrypt-then-MAC (EtM) is a popular mode for authenticated encryption (AE). Unfortunately, almost all designs following the EtM paradigm, including the AE suites for TLS, are vulnerable against nonce ...
Although the exhaustive search algorithm is rather inefficient for typical setting of parameters, our result indicates that lattice-based cryptography is not secure, at least in an asymptotical sense....
To determine the dimension of null space of any given linearized polynomial is one of vital problems in finite field theory, with concern to design of modern symmetric cryptosystems. But, the known ge...
A universal circuit (UC) is a general-purpose circuit that can simulate arbitrary circuits (up to a certain size nn). At STOC 1976 Valiant presented a graph theoretic approach to the construction of U...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...