搜索结果: 1-15 共查到“知识库 Theory”相关记录2318条 . 查询时间(0.198 秒)
An improved theory for calculating leaf gas exchange more precisely accounting for small fluxes
gas exchange leaf von Caemmerer and Farquhar (vCF)
2023/12/8
The widely used theory for gas exchange proposed by von Caemmerer and Farquhar (vCF) integrates molar fluxes, mole fraction gradients and ternary effects but does not account for cuticular fluxes, for...
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited
one-way functions zero knowledge proof computational independence
2019/4/1
We introduce the concept of computationally independent pair of one-way functions (CI-OWF). We also provide two rich classes of examples of such functions based on standard assumptions. We revisit two...
A Traceable Ring Signature Scheme based on Coding Theory
cryptographic protocols digital signatures
2019/4/1
Traceable ring signatures are a variant of ring signatures which allows the identity of a user to be revealed, when it signs two different messages with respect to the same group of users. It has appl...
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
Statistical Learning Theory Encrypted Database Attacks
2019/1/9
We show that the problem of reconstructing encrypted databases from access pattern leakage is closely related to statistical learning theory. This new viewpoint enables us to develop broader attacks t...
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis
Machine Learning Robustness Analysis Supervised Learning
2018/11/21
Profiled side-channel attacks are the most powerful attacks and they consist of two steps. The adversary first builds a leakage model, using a device similar to the target one, then it exploits this l...
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Side-channel analysis belief propagation random probing model
2018/5/28
One important open question in the field of side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security...
CONSTRUCTION THEORY AND NOISE ANALYSIS METHOD OF GLOBAL CGCS2000 COORDINATE FRAME
CGCS2000 globalization coordinate time series Noise analysis construction of geocentric reference frame Geodetic datum
2018/5/14
The definition, renewal and maintenance of geodetic datum has been international hot issue. In recent years, many countries have been studying and implementing modernization and renewal of local geode...
RESEARCH ON DISASTER EARLY WARNING AND DISASTER RELIEF INTEGRATED SERVICE SYSTEM BASED ON BLOCK DATA THEORY
Block data Disaster Early Warning Emergency Relief Data Fusion Service Aggregation TIANDITU (MapWorld)
2018/5/16
With the continuous development of social economy, the interaction between mankind and nature has become increasingly evident. Disastrous global catastrophes have occurred from time to time, causing h...
A Three-Perspective Theory of Cyber Sovereignty
Cyber Sovereignty Three-Perspective Theory Theoretical Framework
2019/10/22
The cybercrime and cyber terrorism raging today are the most visible symptoms of a more pervasive problem concerning cyber security. How to establish a fair and just governance regime in cyberspace an...
On the margins of language: Ideophones, interjections and dependencies in linguistic theory
Ideophones interjections
2017/8/28
Linguistic discovery is viewpoint-dependent, just like our ideas about what is marginal and what is central in language. In this essay I consider two supposed marginalia —ideophones and interjections—...
A Humble Theory and Application for Logic Encryption
logic encryption obfuscation SAT attack
2017/7/24
Logic encryption is an important hardware security technique that introduces keys to modify a given combinational circuit in order to lock the functionality from unauthorized uses. Traditional methods...
Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice
Fuzzy Extractor Physical Unclonable Functions Implementation Attacks
2017/6/2
Fuzzy extractors have been proposed in 2004 by Dodis et al. as a secure way to generate cryptographic keys from noisy sources. Originally, biometrics were the main motivation for fuzzy extractors but ...
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
PRP-to-PRF Encrypted Davies-Meyer Encrypted Davies-Meyer Dual
2017/5/31
At CRYPTO 2016, Cogliati and Seurin introduced the Encrypted Davies-Meyer construction, p2(p1(x)⊕x)p2(p1(x)⊕x) for two nn-bit permutations p1,p2p1,p2, and proved security up to 22n/322n/3. We present ...
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following the framework detailed by Lyubashevsky t...
Integrating Type Theory and Distributional Semantics: A Case Study on Adjective–Noun Compositions
Integrating Type Theory Distributional Semantics
2017/4/6
In this article, we explore an integration of a formal semantic approach to lexical meaning and an
approach based on distributional methods. First, we outline a formal semantic theory that aims
to c...