>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到designs相关记录175条 . 查询时间(0.234 秒)
The understanding of signaling and metabolic processes in multicellular organisms requires knowledge of the spatial dynamics of small molecules and the activities of enzymes, transporters, and other p...
Protein kinase dynamics play key roles in regulation of cell differentiation, growth, development and in diverse cell signaling networks. Protein kinase sensors enable visualization of protein kinase ...
In practice, fractional factorial split-plot (FFSP) designs are widely used when the levels of some factors are very difficult to change or control. The factors of an FFSP design are divided into two ...
Computer chips are packed with billions of microscopic transistors that enable powerful computation, but also generate a great deal of heat. A buildup of heat can slow a computer processor and make it...
The block cipher Jarvis and the hash function Friday, both members of the MARVELlous family of cryptographic primitives, were recently proposed as custom designs aimed at addressing bottlenecks involv...
We show that such a type of trinomial combined with the nn-term KA can fully exploit the spatial correlation of entries in related Mastrovito product matrices and lead to a low complexity architecture...
In the traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implem...
Optimal PRFs from Blockcipher Designs     PRP  PRF  EDMD       2017/8/30
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation (PRP). For many of these modes, including counter mode and ...
Side-channel analysis attacks, particularly power analysis attacks, have become one of the major threats, that hardware designers have to deal with. To defeat them, the majority of the known concepts ...
The design process is essentially a creative process which is reliant on the ability of designers to balance the interactions between a complex set of constraints to arrive at successful solutions. In...
LS-Designs are a family of SPN-based block ciphers whose linear layer is based on the so-called interleaved construction. They will be dedicated to low-end devices with high performance and low-resour...
Side-channel analysis (SCA) attacks pose a serious threat to embedded systems. So far, the research on masking as a countermeasure against SCA focuses merely on cryptographic algorithms, and has eithe...
Here we continue investigation of linear complexity properties of different ways to generate pseudo-random sequences over Galois field wich essentially involves linear recurrences over Galois ring a...
We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015. Our analysis shows that Midori64 has a class of 2^{32} weak keys. Under any such key, the cipher can b...
Schematic maps have been popularly employed to represent transport networks, particularly underground tube lines (or metro lines), since its adoption by the Official London Underground in early 1930s....

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...