搜索结果: 1-15 共查到“知识库 designs”相关记录160条 . 查询时间(0.187 秒)
Designs, applications, and limitations of genetically encoded fluorescent sensors to explore plant biology
plant biology spatial dynamics imaging systems
2023/12/1
The understanding of signaling and metabolic processes in multicellular organisms requires knowledge of the spatial dynamics of small molecules and the activities of enzymes, transporters, and other p...
Protein kinase sensors: an overview of new designs for visualizing kinase dynamics in single plant cells
plant cells protein kinase sensors kinase dynamics signaling networks SnRK2
2023/12/1
Protein kinase dynamics play key roles in regulation of cell differentiation, growth, development and in diverse cell signaling networks. Protein kinase sensors enable visualization of protein kinase ...
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
MARVELlous Jarvis Friday
2019/4/25
The block cipher Jarvis and the hash function Friday, both members of the MARVELlous family of cryptographic primitives, were recently proposed as custom designs aimed at addressing bottlenecks involv...
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials
N-term Karatsuba Algorithm Specific trinomials Bit-parallel Multiplier
2018/6/19
We show that such a type of trinomial combined with the nn-term KA can fully exploit the spatial correlation of entries in related Mastrovito product matrices and lead to a low complexity architecture...
In the traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implem...
Optimal PRFs from Blockcipher Designs
PRP PRF EDMD
2017/8/30
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation (PRP). For many of these modes, including counter mode and ...
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
FPGA Side-channel analysis attacks
2017/3/31
Side-channel analysis attacks, particularly power analysis attacks, have become one of the major threats, that hardware designers have to deal with. To defeat them, the majority of the known concepts ...
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)
implementation cryptanalysis
2017/2/20
LS-Designs are a family of SPN-based block ciphers whose linear layer is based on the so-called interleaved construction. They will be dedicated to low-end devices with high performance and low-resour...
Concealing Secrets in Embedded Processors Designs
protected CPU domain-orientend masking masking
2016/12/8
Side-channel analysis (SCA) attacks pose a serious threat to embedded systems. So far, the research on masking as a countermeasure against SCA focuses merely on cryptographic algorithms, and has eithe...
Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring
matrix linear congruent generator skew linear recurrent sequence pseudo-random sequences
2016/12/8
Here we continue investigation of linear complexity properties of different ways to generate
pseudo-random sequences over Galois field wich essentially involves linear recurrences over
Galois ring a...
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Midori Block Cipher Invariant Subspace Attack
2016/12/8
We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015. Our analysis shows that Midori64 has a class of 2^{32} weak keys. Under any such key, the cipher can b...
IMPACT OF SCHEMATIC DESIGNS ON THE COGNITION OF UNDERGROUND TUBE MAPS
Schematic maps Map design Map cognition
2016/7/8
Schematic maps have been popularly employed to represent transport networks, particularly underground tube lines (or metro lines), since its adoption by the Official London Underground in early 1930s....
Pen and Paper Arguments for SIMON and SIMON-like Designs
SIMON Simeck differential cryptanalysis
2016/6/27
In this work, we analyze the resistance of \textsc{Simon}-like ciphers against differential attacks without using computer-aided methods. In this context, we first define the notion of a \textsc{Simon...
Effect of correlation on power in within-subjects versus between-subjects designs
power within-subjects versus subjects designs
2016/3/16
It is well known that the two dependent-samples t test (and a within-subjects design in general) is typically more powerful than the two independent samples t test (a between-subjects design), and tha...
Optimal designs for multiple treatments with unequal variances
Optimal treatment allocation D-optimality D A -optimality Treatment contrast Product design Variance heterogeneity
2016/1/26
The response of a patient in a clinical trial usually depends on both the se-lected treatment and some latent covariates, while its variance varies across the treatment groups. A general heteroscedast...