>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 designs相关记录160条 . 查询时间(0.187 秒)
The understanding of signaling and metabolic processes in multicellular organisms requires knowledge of the spatial dynamics of small molecules and the activities of enzymes, transporters, and other p...
Protein kinase dynamics play key roles in regulation of cell differentiation, growth, development and in diverse cell signaling networks. Protein kinase sensors enable visualization of protein kinase ...
The block cipher Jarvis and the hash function Friday, both members of the MARVELlous family of cryptographic primitives, were recently proposed as custom designs aimed at addressing bottlenecks involv...
We show that such a type of trinomial combined with the nn-term KA can fully exploit the spatial correlation of entries in related Mastrovito product matrices and lead to a low complexity architecture...
In the traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implem...
Optimal PRFs from Blockcipher Designs     PRP  PRF  EDMD       2017/8/30
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation (PRP). For many of these modes, including counter mode and ...
Side-channel analysis attacks, particularly power analysis attacks, have become one of the major threats, that hardware designers have to deal with. To defeat them, the majority of the known concepts ...
LS-Designs are a family of SPN-based block ciphers whose linear layer is based on the so-called interleaved construction. They will be dedicated to low-end devices with high performance and low-resour...
Side-channel analysis (SCA) attacks pose a serious threat to embedded systems. So far, the research on masking as a countermeasure against SCA focuses merely on cryptographic algorithms, and has eithe...
Here we continue investigation of linear complexity properties of different ways to generate pseudo-random sequences over Galois field wich essentially involves linear recurrences over Galois ring a...
We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015. Our analysis shows that Midori64 has a class of 2^{32} weak keys. Under any such key, the cipher can b...
Schematic maps have been popularly employed to represent transport networks, particularly underground tube lines (or metro lines), since its adoption by the Official London Underground in early 1930s....
In this work, we analyze the resistance of \textsc{Simon}-like ciphers against differential attacks without using computer-aided methods. In this context, we first define the notion of a \textsc{Simon...
It is well known that the two dependent-samples t test (and a within-subjects design in general) is typically more powerful than the two independent samples t test (a between-subjects design), and tha...
The response of a patient in a clinical trial usually depends on both the se-lected treatment and some latent covariates, while its variance varies across the treatment groups. A general heteroscedast...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...