>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到constructions相关记录210条 . 查询时间(0.093 秒)
Since the discovery of Camassa-Holm equation, because of the special properties that peakon gets, it has received considerable attention in modern Mathematics and Physics. Many new integrable dynamic ...
著名数学家Peter Lax 在1968年将重要的非线性数学物理方程---KdV方程表示为一个算子方程, 即给出了KdV方程的Lax表示或Lax对。Lax对在孤立子理论的发展中扮演者重要角色,可以看成是研究可积系统的出发点。但如何构造一个给定非线性系统的Lax表示却是非常困难的问题。本报告在概述Lax表示历史的基础上,以Boris Kupershmidt提出的两个非线性发展型方程为具体例子,介绍L...
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
This paper discusses Lichtenberk’s notion of inclusory constructions as manifested in two closely related East Polynesian languages of the realm of New Zealand: New Zealand Māori and Cook Islands Māor...
In order to study the resistance of a block cipher against boomerang attacks, a tool called the Boomerang Connectivity Table (BCT) for S-boxes was recently introduced. Very little is known today about...
Over the last few years there has been a surge of new cryptographic results, including laconic oblivious transfer, (anonymous/ hierarchical) identity-based encryption, trapdoor functions, chosen-ciphe...
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random l...
Consider the representative task of designing a distributed coin-tossing protocol for nn processors such that the probability of heads is X0∈[0,1]X0∈[0,1], and an adversary can reset one processor to ...
Besides their security, the efficiency of searchable encryption schemes is a major criteria when it comes to their adoption: in order to replace an unencrypted database by a more secure construction, ...
A non-interactive zero-knowledge (NIZK) protocol allows a prover to non-interactively convince a verifier of the truth of the statement without leaking any other information. In this study, we explore...
Monero is the largest cryptocurrency with built-in cryptographic privacy features. The transactions are authenticated using spend proofs, which provide a certain level of anonymity by hiding the sourc...
Code-based cryptography has a long history but did suffer from periods of slow development. The field has recently attracted a lot of attention as one of the major branches of post-quantum cryptograph...
We devise new techniques for design and analysis of efficient lattice-based zero-knowledge proofs (ZKP). First, we introduce one-shot proof techniques for non-linear polynomial relations of degree k≥2...
Dynamic Searchable Symmetric Encryption (DSSEDSSE), apart from providing support for search operation, allows a client to perform update operations on outsourced database efficiently. Two security pro...
Bent functions are optimal combinatorial objects and have been attracted their research for four decades. Secondary constructions play a central role in constructing bent functions since a complete cl...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...