>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Break-Up相关记录112条 . 查询时间(0.046 秒)
近日,中国地质大学海洋学院邓洪旦博士和任建业教授在国际著名科学期刊《Nature Communications》发表题为“South China Sea documents the transition from wide continental rift to continental break up”的学术论文。
How to not break SIDH     isogenies  SIDH  cryptanalysis       2019/5/27
We give a number of approaches which, to a newcomer, may seem like natural ways to attack the SIDH/SIKE protocol, and explain why each of these approaches seems to fail, at least with the specific set...
We improve the attack of Durak and Vaudenay (CRYPTO'17) on NIST Format-Preserving Encryption standard FF3, reducing the running time from O(N5)O(N5) to O(N17/6)O(N17/6) for domain ZN×ZNZN×ZN. Concrete...
Deniable messaging protocols allow two parties to have `off-the-record' conversations without leaving any record that can convince external verifiers about what either of them said during the conversa...
On the basis of introducing the SPH (Smooth Particle Hydrodynamics) simulation method, the key research problems were given solutions in this paper, which ere the spatial scale and temporal scale adap...
Embedded IoT devices are often built upon large system on chip computing platforms running a significant stack of software. For certain computation-intensive operations such as signal processing or en...
Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree.
In this paper, we propose a reduction technique that can be used to determine the density of IV terms of a complex multivariable boolean polynomial. Using this technique, we revisit the dynamic cube a...
The evaluation of dormancy break based on the number of flower buds in bloom was performed in years 2011–2013 (January–April) for 15 peach cultivars compared to the control cv. Redhaven. Based on the ...
An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as ...
While AES is extensively in use in a number of applications, its area cost limits its deployment in resource constrained platforms. In this paper, we have implemented SIMON, a recent promising low-c...
Recently, a laser scanner has been receiving more attention as a useful tool for real-time 3D data acquisition, and various applications such as city modelling, DTM generation and 3D modelling of cult...
Recently, a laser scanner has been receiving more attention as a useful tool for real-time 3D data acquisition, and various applications such as city modeling, DTM generation and 3D modeling of cult...
Break dancing is a popular activity in teenagers and is associated with severe trauma to bones and tissues. We report the first known case of a break dancer with an ulnar stress fracture. Such injurie...
Ewe verbs covering the cutting and breaking domain divide into four morpho-syntactic classes that can be ranked according to agentivity. We demonstrate that the highly non-agentive break verbs partici...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...