>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 61-75 共查到differential相关记录1141条 . 查询时间(0.045 秒)
Differential geometry is one of the most research intensive areas of mathematics in the late twentieth and early twenty-first century. Its current prominence stems in part from its position at a cross...
Nonlinear Partial Differential Equations naturally appear in gas motions, fluid mechanics, differential geometry and many other fields, which cover compressible and incompressible Navier-Stokes equati...
PDEs are among the most powerful tools in both geometry and physics. Fundamental geometric problems like the Poincare ́ conjecture have been solved with PDEs, and the basic field equations of phy...
The primary goal of this conference is to bring together scientists and mathematicians working in partial differential equations and related fields. Contemporary challenges raised by recent advances i...
A central challenge in differential privacy is to design computationally efficient noninteractive algorithms that can answer large numbers of statistical queries on a sensitive dataset. That is, we wo...
The robustness of (approximate) differential privacy (DP) guarantees in the presence of thousands and even hundreds of thousands observations is crucial for many realistic application scenarios, such ...
Nonlinear permutations (S-boxes) are key components in block ciphers. Differential branch number measures the diffusion power of a permutation. Differential branch number of nonlinear permutations of ...
Deterministic signature schemes are becoming more popular, as illustrated by the deterministic variant of ECDSA and the popular EdDSA scheme, since eliminating the need for high-quality randomness mig...
Background: In a simulated gastrointestinal environment, the cheese matrix modulates dairy fat digestion. However, to our knowledge, the impact of the cheese matrix on postprandial lipemia in humans h...
For a given vectorial Boolean function FF from Fn2F2n to itself it was defined an associated Boolean function γF(a,b)γF(a,b) in 2n2n variables by C.~Carlet, P.~Charpin, V.~Zinoviev in 1998 that takes ...
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper...
We give the first information-theoretic security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme. Our proof consists of the following steps. We construct an EPR var...
At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES has been presented. Although it allows to distinguish a random permutation from an AES like one, it seems (rather) hard to exploit ...
Expectancy mechanisms are routinely used by the cognitive system in stimulus processing and in anticipation of appropriate responses. Electrophysiology research has documented negative shifts of brain...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...