搜索结果: 1-15 共查到“Codes”相关记录339条 . 查询时间(0.104 秒)
南京农业大学农学院《New Phytologist》发表植物环境适应分子遗传研究课题组“A major gene for chilling tolerance variation in Indica rice codes for a kinase OsCTK1 that phosphorylates multiple substrates under cold”(图)
植物环境 分子遗传
2024/4/29
水稻起源于热带和亚热带,对低温十分敏感,当温度低于15℃时水稻便无法正常生长。有统计显示,每年低温冷害导致我国水稻减产约50亿kg。近年来,因直播稻大面积推广以及水稻种植区域不断由热带、亚热带向高海拔、高纬度地区扩张,水稻遭受低温冷害的频率有增加趋势。低温冷害已成为限制我国水稻生产的一大瓶颈。因此,挖掘调控水稻耐冷性的关键基因,研究其作用机理,对防控水稻低温冷害具有重要意义。
NRC approves use of Framatome codes in advanced nuclear fuel development(图)
NRC 核燃料 Framatome代码
2023/4/27
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A cooperative repair framework for RS Codes
RS代码 协作修复 框架 分布式存储系统
2023/4/21
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Twisted generalized Reed-Solomon codes with twists
扭曲 广义 里德-所罗门代码 RS编码
2023/4/25
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Minimum storage cooperative regenerating codes for distributed storage
分布式存储 最小存储 协同再生码
2023/5/16
清华大学殷柳国教授来中北大学信息与通信工程学院作“Generalized Sparse Codes for Non-Gaussian Channels: Code Design,Algorithms, and Applications”专题报告(图)
清华大学 殷柳国 中北大学信息与通信工程学院 广义随机编码 抗干扰 通信编码
2022/11/24
上海财经大学信息管理与工程学院数据挖掘课件 Data Mining with R(Codes)
上海财经大学 信息管理与工程学院 数据挖掘 课件 Data Mining with R
2019/7/24
上海财经大学信息管理与工程学院数据挖掘课件 Data Mining with R(Codes)。
A Reaction Attack against Cryptosystems based on LRPC Codes
Rank-based cryptography Code-based cryptography LRPC cryptosystems
2019/7/22
Rank metric is a very promising research direction for code-based cryptography. In fact, thanks to the high complexity of generic decoding attacks against codes in this metric, it is possible to easil...
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes
Discrete Gaussian sampling Polar codes Integer lattice
2019/6/10
Cryptographic constructions based on hard lattice problems have emerged as a front runner for the standardization of post quantum public key cryptography. As the standardization process takes place, o...
Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space
Non-Malleable Codes Proofs of Space Tamper-resilience
2019/5/24
Non-malleable codes are encoding schemes that provide protections against various classes of tampering attacks. Recently Faust et al. (CRYPTO 2017) initiated the study of space- bounded non-malleable ...
Cryptanalysis of a System Based on Twisted Reed–Solomon Codes
Code-based cryptography McEliece Cryptosystem Subfield Subcodes
2019/4/29
It was recently proved that twisted Reed--Solomon codes represent a family of codes which contain a large amount of MDS codes, non-equivalent to Reed--Solomon codes. As a consequence, they were propos...
Efficient Message Authentication Codes with Combinatorial Group Testing
Message authentication code Combinatorial group testing Data corruption
2019/4/23
Message authentication code, MAC for short, is a symmetric-key cryptographic function for authenticity. A standard MAC verification only tells whether the message is valid or invalid, and thus we can ...
Inception makes non-malleable codes shorter as well!
Non-malleable codes Randomness extraction
2019/4/22
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs in ICS 2010, have emerged in the last few years as a fundamental object at the intersection of cryptography and coding theory. Non-ma...
Non-Malleable Codes for Decision Trees
non-malleable codes decision trees small-depth circuits
2019/4/16
We construct efficient, unconditional non-malleable codes that are secure against tampering functions computed by decision trees of depth d=n1/4−o(1)d=n1/4−o(1). In particular, each bit of...
Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes
Post-Quantum Cryptography Decryption Failures Side-Channel Attacks
2019/3/20
While error correcting codes (ECC) have the potential to significantly reduce the failure probability of post-quantum schemes, they add an extra ECC decoding step to the algorithm. As this additional ...