搜索结果: 1-15 共查到“general”相关记录1015条 . 查询时间(0.121 秒)
IAEA director general: “Cause for concern” over North Korea’s nuclear program(图)
国际原子能机构 朝鲜 核计划
2024/1/31
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:The complexity of computing Markov perfect equilibrium in general-sum stochastic games
一般 随机博弈 马尔可夫完美均衡 计算复杂性
2023/5/12
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Unsolved conjectures in Mathematical General Relativity
数学 广义相对论 未解 猜想
2023/5/5
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:On varieties of general type with many global forms
全局形式 一般类型 品种
2023/5/6
Nuclear Safety and Security Side Events at the 66th IAEA General Conference(图)
国际原子能机构 第六十六届大会 核安全 核安保
2023/3/14
A new way to perform "general inverse design" with high accuracy(图)
通用逆设计 SMART 特性识别材料 机器学习
2023/6/7
新乡学院英国概况课件 General Elections。
华南师范大学心理学院博士后常帅在《Journal of Experimental Psychology: General》上发表高水平原创研究论文(图)
华南师范大学心理学院 博士后 常帅 实验心理学
2019/10/15
2019年9月19日,华南师范大学心理学院博士后、特聘副研究员常帅博士在经典高水平实验心理学杂志Journal of Experimental Psychology: General(5年影响因子5.3)上以第一作者身份发表论文“The functional effects of voluntary and involuntary phantom color on conscious awaren...
广东工业大学自动化学院国际贸易实务电子课件Unit 2 general procedure。
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Group actions isomorphism problems signature schemes
2019/6/12
Starting from the one-way group action framework of Brassard and Yung (Crypto '90), we revisit building cryptography based on group actions. Several previous candidates for one-way group actions no lo...
Continuously Non-Malleable Secret Sharing for General Access Structures
Secret sharing Non-malleability Leakage resilience
2019/6/3
We study leakage-resilient continuously non-malleable secret sharing, as recently intro- duced by Faonio and Venturi (CRYPTO 2019). In this setting, an attacker can continuously tamper and leak from a...
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
zkSNARKs transparent zkSNARKs SNARKs
2019/5/23
This paper describes a new public coin, succinct interactive zero-knowledge argument for NP under standard cryptographic hardness assumptions—without requiring a trusted setup. In particular, our argu...
安徽三联学院外语学院外贸函电课件 General Introduction。
Secret-Sharing Schemes for General and Uniform Access Structures
secret sharing conditional disclosure of secrets protocols private simultaneous messages protocols
2019/3/4
A secret-sharing scheme allows some authorized sets of parties to reconstruct a secret; the collection of authorized sets is called the access structure. For over 30 years, it was known that any (mono...
Four-Round Secure Multiparty Computation from General Assumptions
multi-party computation oblivious transfer round optimal
2019/2/28
In this work we continue the study on the round complexity of secure multi-party computation with black-box simulation in the simultaneous broadcast model where all the parties get the output.