搜索结果: 1-15 共查到“Scheme”相关记录1071条 . 查询时间(0.125 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Energy stability and error analysis of a maximum bound principle preserving scheme for the dynamical Ginzburg-Landau equations of Superconductivity
超导动力学 金茨堡-朗道方程 最大界界原理 能量稳定性 误差分析
2023/4/25
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Traceability of Water Pollution: An Inversion Scheme via Dynamic CGO Solutions
水污染 可追溯性 动态CGO解决方案 反演方案
2023/4/21
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Pandora Box Problem with Nonobligatory Inspection: Hardness and Approximation Scheme
潘多拉盒问题 非强制性检查 硬度 近似方案
2023/4/14
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A second order accurate, decoupled numerical scheme for magnetohydrodynamic equations
磁流体 动力学方程 二阶精确解 耦数值方案
2023/4/27
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A diffusion scheme based on the foliation graph stripe for optimizing discrete harmonic foliation energy
叶子图条带 优化 离散谐波 叶能量 扩散方案
2023/4/28
A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs
Password Authentication VANET Group-Key generation
2019/9/19
Vehicular Ad-hoc Networks (VANETs) are a cardinal part of intelligent transportation system (ITS) which render various services in terms of traffic and transport management. The VANET is used to manag...
Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity
polynomial commitments zero-knowledge proofs proximity testing
2019/9/16
We introduce novel efficient and transparent construction of the polynomial commitment scheme. A polynomial commitment scheme allows one side (the prover) to commit to a polynomial of predefined degre...
An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice
multi-proxy multi-signature scheme multi-signature scheme ID-based signature
2019/9/16
Multi-proxy multi-signature schemes are useful in distributed networks, where a group of users cooperatively could delegate their administrative rights to the users of another group, who are authorize...
CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme
Authenticated Cipher COLM CPA
2019/8/22
Authenticated encryption schemes provide both confidentiality and integrity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, like all physical impl...
Abstract. The extremely efficient Rabin-Williams signature scheme relies on decryption of a quadratic equation in order to retrieve the original message. Customarily, square roots are found using the ...
Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection
Side-channel Analysis Inner Product Masking Fault Detection
2019/8/14
Side-channel analysis and fault injection attacks are two typical threats to cryptographic implementations, especially in modern embedded devices. Thus there is an insistent demand for dual side-chann...
The Singularity Attack to the Multivariate Signature Scheme Himq-3
Multivariate public key cryptosystem Cryptanalysis Oil Vinegar Signature Scheme
2019/8/6
In 2017 Kyung-Ah Shim et al proposed a multivariate signature scheme called Himq-3 which is a submission to National Institute of Standards and Technology (NIST) standardization process of post-quantu...
A Blockchain-Based Access Control Scheme for Smart Grids
smart grids access control blockchain
2019/8/2
At present, the access control schemes in the power grid are centralized. In the centralized system, the data of the network sensor nodes is transmitted by centralized nodes, and the data itself may b...
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Private Information Retrieval PIR homomorphic encryption
2019/7/24
We introduce the WIDESEAS protocol for lattice-based Private Information Retrieval (PIR), and we give performance numbers for its recent implementation in the EncryptedQuery open-source PIR software. ...