搜索结果: 1-15 共查到“exponential”相关记录267条 . 查询时间(0.265 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:P-adic Simpson correspondence via exponential twisting
指数扭曲 P—adic—Simpson对应 p-adic-Simpson对应关系
2023/12/11
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Normalized solutions of nonlinear Schrodinger equations with exponential critical growth
指数临界增长 非线性薛定谔方程 归一化解
2023/5/15
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Exponential decay of intersection volume and applications
交叉体积 指数衰减 公制空间
2023/4/23
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Energy stability of exponential time differencing schemes for the nonlocal Cahn-Hilliard equation
非局部 Cahn-Hilliard方程 指数时间 差分方案 能量稳定性
2023/4/24
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Exponential mixing of frame flows for geometrically finite hyperbolic manifolds with cusps
几何有限 双曲流形带尖 框架流 指数混合
2023/4/28
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars: Exponential mixing of frame flows for geometrically finite hyperbolic manifolds with cusps
几何有限 双曲流形带尖 框架流 指数混合
2023/5/4
A secret sharing scheme allows a dealer to distribute shares of a secret among a set of nn parties P={p1,…,pn}P={p1,…,pn} such that any authorized subset of parties can reconstruct the secret, yet any...
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling
Side Channel Rank Estimation Key Enumeration
2018/11/13
Rank estimation is an important tool for a side-channel evaluations laboratories. It allows estimating the remaining security after an attack has been performed, quantified as the time complexity and ...
Towards Breaking the Exponential Barrier for General Secret Sharing
Exponential Barrier General Secret Sharing
2017/11/10
A secret-sharing scheme for a monotone Boolean (access) function F:{0,1}n→{0,1}F:{0,1}n→{0,1} is a randomized algorithm that on input a secret, outputs nn shares s1,…,sns1,…,sn such that for any (x1,…...
Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions
non-malleable commitments two rounds
2017/4/5
Despite fifteen years of research on the round complexity of non-malleable commitments, their exact round complexity has remained open. In particular, the goal of achieving non-malleable commitment pr...
Determination of relative Faraday cup efficiency factor using exponential law mass fractionation model for multiple collector thermal ionization mass spectrometry
Faraday cup efficiency TIMS Sr isotope exponential
2017/4/10
A new method for determining the relative Faraday cup efficiency (RFCE) for nine Faraday cups has been developed
using 86Sr, 87Sr, and 88Sr isotope signals, and the exponential mass fractionation law...
Breaking the Sub-Exponential Barrier in Obfustopia
Indistinguishability Obfuscation Functional Encryption Trapdoor Permutation
2016/2/23
Indistinguishability obfuscation (iO) has emerged as a surprisingly powerful notion. Almost
all known cryptographic primitives can be constructed from general purpose iO and other minimalistic
assum...
Weak extinction versus global exponential growth of total mass for superdi usions corresponding to the operator Lu + βu − ku2
superdiffusion superprocess measure-valued process gauge theorem Kato class growth bound
2016/1/25
Consider a superdiffusion X on R d corresponding to the semilinear operator A(u) = Lu + βu − ku 2 , where L is a second order elliptic operator, β(·) is in the Kato class and bounded from above,...
Weak extinction versus global exponential growth of total mass for superdi usions corresponding to the operator Lu + βu − ku2
superdiffusion superprocess measure-valued process gauge theorem Kato class growth bound principal eigenvalue
2016/1/20
Consider a superdiffusion X on R d corresponding to the semilinear operator A(u) = Lu + βu − ku 2 , where L is a second order elliptic operator, β(·) is in the Kato class and bounded from above,...
Improved Exponential-time Algorithms for Inhomogeneous-SIS
Short integer solution problem (SIS) SWIFFT hash function subset-sum
2016/1/8
The paper is about algorithms for the inhomogeneous short integer solution problem: Given
(A, s) to find a short vector x such that Ax ≡ s (mod q). We consider algorithms for this problem due
to Cam...