搜索结果: 1-15 共查到“知识库 Size”相关记录973条 . 查询时间(0.171 秒)
Studies on genome size estimation, chromosome number, gametophyte development and plant morphology of salt-tolerant halophyte Suaeda salsa
Soil salinization Suaeda salsa Gametophyte Chromosome Genome
2024/2/5
Soil salinization and alkalization are among the major agricultural threats that affect crop productivity worldwide, which are increasing day by day with an alarming rate. In recent years, several hal...
InDel Marker Based Estimation of Multi-Gene Allele Contribution and Genetic Variations for Grain Size and Weight in Rice (Oryza sativa L.)
Insertion/Deletion (InDel) markers genetic variation multi-gene allele contributions rice (Oryza sativa L.), grain size and weight rice germplasm
2023/8/9
The market success of any rice cultivar is exceedingly dependent on its grain appearance, as well as its grain yield, which define its demand by consumers as well as growers. The present study was und...
Visualizing size-security tradeoffs for lattice-based encryption
lattice-based cryptography security estimates network traffic
2019/6/5
There are many proposed lattice-based encryption systems. How do these systems compare in the security that they provide against known attacks, under various limits on communication volume? There are ...
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
public-key cryptography Standard Assumptions
2019/6/4
We construct a broadcast and trace scheme (also known as trace and revoke or broadcast, trace and revoke) with NN users, where the ciphertext size can be made as low as O(Nϵ)O(Nϵ), for any...
Improved prover efficiency and SRS size in a Sonic-like system
zk-SNARKs updatable SRS universal SRS
2019/6/3
Using ideas from the recent Aurora zk-STARK of Ben-Sasson et al. [BCRSVW, Eurocrypt 2019], we present a zk-SNARK with a universal and updatable SRS similar to the recent construction of Maller et al. ...
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs
Ring Confidential Transactions Log-size Proofs
2019/5/31
Monero is the largest cryptocurrency with built-in cryptographic privacy features. The transactions are authenticated using spend proofs, which provide a certain level of anonymity by hiding the sourc...
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
confidential transaction ring signatures set membership proof
2019/5/21
In this paper, we propose the most competent blockchain ring confidential transaction protocol (RingCT3.0) for protecting the privacy of the sender's identity, the recipient's identity and the confide...
A Method to Reduce the Key Size of UOV Signature Scheme
digital signatures public-key cryptography
2019/5/13
Multivariate public key signature scheme has a good performance on speed and signature size. But most of them have a huge public key size. In this paper, we propose a new method to reduce the public k...
Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions
ring signatures linkable ring signatures standard model
2019/3/1
Ring signatures allow for creating signatures on behalf of an ad hoc group of signers, hiding the true identity of the signer among the group. A natural goal is to construct a ring signature scheme fo...
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings
zero knowledge zk-SNARKs universal SRS
2019/2/27
Zero-knowledge proofs have become an important tool for addressing privacy and scalability concerns in cryptocurrencies and other applications. In many systems each client downloads and verifies every...
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Oblivious RAM Multi-Server Setting Secure Computation
2019/1/26
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to securely execute RAM programs over data that is stored in an untrusted server. Distributed Oblivious RAM is a variant of ORAM,...
On a Rank-Metric Code-Based Cryptosystem with Small Key Size
code-based cryptography rank-metric codes interleaving
2018/12/19
A repair of the Faure-Loidreau (FL) public-key code-based cryptosystem is proposed.The FL cryptosystem is based on the hardness of list decoding Gabidulin codes which are special rank-metric codes. We...
Estimation of genetic parameters of fatty acids composition in flesh of market size common carp (Cyprinus carpio L.) and their relation to performance traits revealed that selective breeding can indirectly affect flesh quality
genetic correlations genetic improvement growth heritability slaughtering traits, supplemental feeding
2018/11/23
Fish are a rich source of omega-3 polyunsaturated fatty acids (n-3 PUFAs) and thus, they should be an integral part of human diet at least twice a week. As a result, high attention has been devoted to...
Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication
side-channel analysis Threshold Implementation AES
2018/11/12
It is well known that Canright’s tower field construction leads to a very small, unprotected AES S-box circuit by recursively embedding Galois Field operations into smaller fields. The current size re...
Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via Permutations
McEliece cryptosystem automorphism-incuded Goppa codes quasi-cyclic
2018/11/2
In this paper, we propose a new general construction to reduce the public key size of McEliece-based schemes based on Goppa codes. In particular, we generalize the ideas of automorphism-induced Goppa ...