搜索结果: 1-4 共查到“军事学 significant”相关记录4条 . 查询时间(0.078 秒)
Secure top most significant genome variants search: iDASH 2017 competition
genome variants search private genomic data IDASH competition
2018/4/4
One of the 3 tracks of iDASH Privacy & Security Workshop 2017 competition was to execute a whole genome variants search on private genomic data. Particularly, the search application was to find the to...
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations
Significant Fourier transform Goldreich-Levin algorithm Kushilevitz-Mansour algorithm
2016/7/13
Ideas from Fourier analysis have been used in cryptography for three decades. Akavia, Goldwasser
and Safra unified some of these ideas to give a complete algorithm that finds significant
Fourier coe...
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
RSA LSBS-RSA short exponent attack lattice reduction technique
2009/6/5
LSBS-RSA denotes an RSA system with modulus primes, p and q, sharing a large
number of least signi
cant bits. In ISC 2007, Zhao and Qi analyzed the security of short
exponent LSBS-RSA. They cla...
Embedding in Two Least Significant Bits with Wet Paper Coding
Two Least Significant Bits Wet Paper Coding steganalytic attacks
2009/6/5
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are inspired by the work of...