搜索结果: 1-15 共查到“Cyclic”相关记录178条 . 查询时间(0.125 秒)
Fully Bio-Based Polyhydroxyurethanes with a Dynamic Network from a Terpene Derivative and Cyclic Carbonate Functional Soybean Oil
fully bio-based non-isocyanate?polyurethanes dynamic covalent bond exchange self-healing recyclability shape memory
2023/12/18
Polyhydroxyurethanes (PHUs), polyurethanes with excellent properties, are cured without poisonous isocyanate. The carbamate groups in the structure can undergo bond exchange in the presence of amino g...
Properties of biobased epoxy resins from epoxidized linseed oil (ELO) crosslinked with a mixture of cyclic anhydride and maleinized linseed oil
termosetting resins epoxidized linseed oil crosslinking cyclic anhydrides modified vegetable oils
2024/3/5
This works aims at the development thermosetting resins derived from epoxidized linseed oil (ELO) of high biobased content, by using a mixture of crosslinking agents, i.e. methyl nadic anhydride (MNA)...
Structured Module Learning With Errors From Cyclic Algebras
Lattices Public-Key Cryptography Learning With Errors
2019/6/12
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice based cryptography, allowing one to establish cryptography on the hardness of well-studied computational problems. ...
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption
logic encryption SAT-based attack cyclic circuit
2019/1/26
Cyclic logic encryption is newly proposed in the area of hardware security. It introduces feedback cycles into the circuit to defeat existing logic decryption techniques. To ensure that the circuit is...
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States
logic encryption SAT-based attack cyclic circuit
2019/1/26
Logic encryption has attracted much attention due to increasing IC design costs and growing number of untrusted foundries. Unreachable states in a design provide a space of flexibility for logic encry...
Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes
code-based cryptography post quantum cryptograp elliptic code
2018/12/6
With the fast development of quantum computation, code based cryptography arises public concern as a candidate of post quantum cryptography. However, the large key-size becomes a main drawback such th...
Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks
cyclic circuit logic encryption circuit obfuscation
2017/12/11
The high cost of IC design has made chip protection one of the first priorities of the semiconductor industry. Although there is a common impression that combinational circuits must be designed withou...
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions
hardware security logic encryption SAT
2017/6/28
Cyclic logic encryption is a newly proposed circuit obfuscation technique in hardware security. It was claimed to be SAT-unresolvable because feedback cycles were intentionally inserted under keys int...
Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets
secret-key cryptography cyclic-additive difference sets
2017/6/8
In the preprint [Characterizations of the differential uniformity of vectorial functions by the Walsh transform, IACR ePrint Archive 2017/516], the author has, for each even positive δδ, characterized...
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups
Non-Interactive Assumptions Computational Assumptions Target Assumptions
2017/4/24
Our analysis identifies two families of intractability assumptions, the qq-Generalized Diffie-Hellman Exponent assumptions and the qq-Simple Fractional assumptions that imply all other target assumpti...
Efficient Encryption from Random Quasi-Cyclic Codes
Code-based Cryptography Public-Key Encryption Post-Quantum Cryptography
2017/1/3
We propose a framework for constructing efficient code-based encryption schemes from codes that do not hide any structure in their public matrix. The framework is in the spirit of the schemes first pr...
Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes
MDS matrices involutions cyclic codes
2016/12/7
A good linear diffusion layer is a prerequisite in the design of block ciphers. Usually it is obtained by combining matrices with optimal diffusion property over the Sbox alphabet. These matrices are ...
Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗
discrete logarithm problem finite cyclic groups
2016/1/23
The Discrete Logarithm Problem is at the base of the famous Diffie Hellman key agreement algorithm and many others. The key idea behind Diffie Helmann is the usage of the Discrete Logarithm function i...
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.
Public key cryptosystem Reed-Solomon code Cyclic code
2015/12/24
In this paper, we first present a new class of code based public key cryptosystem(PKC) based on ReedSolomon
code over extension field of less than m=9, referred to as K(XVI)SE(1)PKC. We then present ...
Let K be an algebraically closed field of characteristic zero and let f ∈ K[x]. The m-th cyclic resultant of f is rm = Res(f, xm − 1). A generic monic polynomial is determined by its full sequen...