搜索结果: 1-15 共查到“Note”相关记录628条 . 查询时间(0.096 秒)
安顺学院外国语学院实用口译课件unit 5-Note-taking principles and skills
安顺学院外国语学院 实用口译 课件 unit 5 Note-taking principles skills
2019/12/20
安顺学院外国语学院实用口译课件unit 5-Note-taking principles and skills。
We examine the current parameter choice of Round5, and rectify its consideration of the improved dual attack due to Albrecht [Albrecht-EC17]: there is one significant optimization of Albrecht's dual a...
日前,哈尔滨医科大学附属第二医院妇产科四病房微创腔镜中心创新运用自然孔腹腔镜(V-Note)技术,经阴道入路,成功为一位阴道最深处“藏”着5厘米肿瘤的患者完成了肿瘤切除手术。术中,孔宪超教授带领的团队克服了阴道操作空间狭小、肿物位置深暴露障碍、“筷子效应”导致器械互相干扰等重重困难,仅用35分钟就完成了手术,术中出血仅为10ml,由于手术创伤极小,患者术后第二天便已顺利出院。据悉,目前国内没有V-...
A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation
side-channel analysis leakage detection security certification
2019/6/14
An established ingredient in the security evaluation of cryptographic devices is leakage detection, whereby physically observable characteristics such as the power consumption are measured during oper...
A Note on Lower Digits Extraction Polynomial for Bootstrapping
Fully Homomorphic Encryption Bootstrapping
2019/6/12
Bootstrapping is a crucial but computationally expensive step for realizing Fully Homomorphic Encryption (FHE). Recently, Chen and Han (Eurocrypt 2018) introduced a family of low-degree polynomials to...
鲁东大学交替传译课件Lecture9 Note-taking for Consecutive Interpreting
鲁东大学 交替传译 课件 Lecture9 Note-taking for Consecutive Interpreting
2019/6/11
鲁东大学交替传译课件Lecture9 Note-taking for Consecutive Interpreting。
A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model
Verifiable Delay Functions Random Oracle Model
2019/6/6
Boneh, Bonneau, B{\"u}nz, and Fisch (CRYPTO 2018) recently introduced the notion of a \emph{verifiable delay function} (VDF). VDFs are functions that take a long \emph{sequential} time TT to compute, ...
A note on different types of ransomware attacks
ransomware analysis infection crypto-ransomware
2019/6/3
Ransomware are malware whose purpose is to generate income for the attacker. The first of these malware made intense use of cryptography, specifically for file encryption. They encrypt some or most fi...
A note on the correlations between NIST cryptographic statistical tests suite
statistical testing cryptographic evaluation random bit generators
2019/5/24
This paper is focused on an open question regarding the correlation and the power of the NIST statistical test suite. If we found some correlation between these statistical tests, then we can improve ...
A Note on Sub-Gaussian Random Variables
sub-Gaussians fully homomorphic encryption FHE boostrapping
2019/5/21
A sub-Gaussian distribution is any probability distribution that has tails bounded by a Gaussian and has a mean of zero. It is well known that the sum of independent sub-Gaussians is again sub-Gaussia...
This paper presents the results of a new approach to the cryptanalysis of SIMON-32/6432/64, a cipher published by NSA in 2013. Our cryptanalysis essentially considers combinatorial properties. These p...
A Note on Key Agreement and Non-Interactive Commitments
Non-interactive commitments key agreement
2019/3/13
We observe that any key agreement protocol satisfying perfect completeness, regardless of its round complexity, can be used to construct a non-interactive commitment scheme.
A note on isogeny-based hybrid verifiable delay functions
verifiable delay function time-lock puzzle isogeny-based cryptography
2019/3/1
Using the idea behind the recently proposed isogeny- and paring-based verifiable delay function (VDF) by De Feo, Masson, Petit and Sanso, we construct an isogeny-based VDF without the use of pairings....
绥化学院外国语学院高级英语写作课件第一章 NOTE。
A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness
side-channel probing model transitional leakage
2018/11/21
Recently, Gross et al. demonstrated a first-order probing-secure implementation of AES using only two bits of randomness for both the initial sharing and the entire computation of AES. In this note, w...