搜索结果: 1-15 共查到“designs”相关记录175条 . 查询时间(0.234 秒)
Designs, applications, and limitations of genetically encoded fluorescent sensors to explore plant biology
plant biology spatial dynamics imaging systems
2023/12/1
The understanding of signaling and metabolic processes in multicellular organisms requires knowledge of the spatial dynamics of small molecules and the activities of enzymes, transporters, and other p...
Protein kinase sensors: an overview of new designs for visualizing kinase dynamics in single plant cells
plant cells protein kinase sensors kinase dynamics signaling networks SnRK2
2023/12/1
Protein kinase dynamics play key roles in regulation of cell differentiation, growth, development and in diverse cell signaling networks. Protein kinase sensors enable visualization of protein kinase ...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:erration split-plot designs via complementary sets when the whole plot factors are important
图因子 互补集 错误分割图设计
2023/5/15
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
MARVELlous Jarvis Friday
2019/4/25
The block cipher Jarvis and the hash function Friday, both members of the MARVELlous family of cryptographic primitives, were recently proposed as custom designs aimed at addressing bottlenecks involv...
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials
N-term Karatsuba Algorithm Specific trinomials Bit-parallel Multiplier
2018/6/19
We show that such a type of trinomial combined with the nn-term KA can fully exploit the spatial correlation of entries in related Mastrovito product matrices and lead to a low complexity architecture...
In the traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implem...
Optimal PRFs from Blockcipher Designs
PRP PRF EDMD
2017/8/30
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation (PRP). For many of these modes, including counter mode and ...
SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA
FPGA Side-channel analysis attacks
2017/3/31
Side-channel analysis attacks, particularly power analysis attacks, have become one of the major threats, that hardware designers have to deal with. To defeat them, the majority of the known concepts ...
2017第四届硬件设计自动化研讨会(2017 4th Workshop on Design Automation for Understanding Hardware Designs DUHDe 2017)
第四届 硬件设计自动化 研讨会
2017/3/28
The design process is essentially a creative process which is reliant on the ability of designers to balance the interactions between a complex set of constraints to arrive at successful solutions. In...
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)
implementation cryptanalysis
2017/2/20
LS-Designs are a family of SPN-based block ciphers whose linear layer is based on the so-called interleaved construction. They will be dedicated to low-end devices with high performance and low-resour...
Concealing Secrets in Embedded Processors Designs
protected CPU domain-orientend masking masking
2016/12/8
Side-channel analysis (SCA) attacks pose a serious threat to embedded systems. So far, the research on masking as a countermeasure against SCA focuses merely on cryptographic algorithms, and has eithe...
Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring
matrix linear congruent generator skew linear recurrent sequence pseudo-random sequences
2016/12/8
Here we continue investigation of linear complexity properties of different ways to generate
pseudo-random sequences over Galois field wich essentially involves linear recurrences over
Galois ring a...
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs
Midori Block Cipher Invariant Subspace Attack
2016/12/8
We present an invariant subspace attack on the block cipher Midori64, proposed at Asiacrypt 2015. Our analysis shows that Midori64 has a class of 2^{32} weak keys. Under any such key, the cipher can b...
IMPACT OF SCHEMATIC DESIGNS ON THE COGNITION OF UNDERGROUND TUBE MAPS
Schematic maps Map design Map cognition
2016/7/8
Schematic maps have been popularly employed to represent transport networks, particularly underground tube lines (or metro lines), since its adoption by the Official London Underground in early 1930s....