>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到asymmetric相关记录191条 . 查询时间(0.046 秒)
水稻是全球最为重要的粮食作物之一,在其漫长的驯化过程中形成了形态各异的水稻栽培亚型,包括粳稻、籼稻、Aro和Aus等。在水稻栽培种植历史过程中,有些水稻逐渐恢复部分野生稻表型特征,最终演化成严重威胁全球水稻产量的杂草稻,这种现象称之为“去驯化”。通过基因组进化研究发现,大量驯化位点的变异在去驯化过程中并不能得到恢复,这就暗示着可能存在别的遗传机制来调控杂草稻在去驯化过程中恢复野生稻表型。DNA甲基...
Password-Authenticated Key Exchange (PAKE) is a method to establish cryptographic keys between two users sharing a low-entropy password. In its asymmetric version, one of the users acts as a server an...
In recent years, several cryptographic scholars have proposed quantum blind signature schemes. However, their methods require the signatories and the inspectors to share common keys in advance, which ...
Strong Asymmetric PAKE based on Trapdoor CKEM     PAKE  ROM       2019/6/5
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that share a password to establish a shared key in a way that is immune to oine attacks. Asymmetric PAKE (aPAKE) [21] adapts thi...
Content moderation is crucial for stopping abuse and harassment via messaging on online platforms. Existing moderation mechanisms, such as message franking, require platform providers to see user iden...
Lattice-based cryptosystems are less efficient than their number-theoretic counterparts (based on RSA, discrete logarithm, etc.) in terms of key and ciphertext (signature) sizes. For adequate security...
In 2018, Shi et al. 's showed that Kaushik et al.'s quantum signature scheme is defective. It suffers from the forgery attack. They further proposed an improvement, trying to avoid the attack. However...
Structure-Preserving Signatures (SPSs) are a useful tool for the design of modular cryptographic protocols. Recent series of works have shown that by limiting the message space of those schemes to the...
We revisit constructions of asymmetric primitives from obfuscation and give simpler alternatives. We consider public-key encryption, (hierarchical) identity-based encryption ((H)IBE), and predicate en...
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that only share a password to establish a shared key in a way that is immune to offline attacks. Asymmetric PAKE (aPAKE) strength...
Within recent years, secure comparison protocols have been proposed using binary decomposition and properties of algebraic fields. These have been repeatedly optimized and increased in efficiency, but...
The paper analyses the effects of asymmetric competition on food industry with product substitutability by establishing a two-stage dynamic game model. The equilibrium is captured under both the Courn...
In bacterial photosynthetic reaction centers, ultrafast singlet excited state energy transfer occurs from the monomeric bacteriochlorophylls, B, and bacteriopheophytins, H, to the homodimer special pa...
We introduce a novel notion of smooth (-verifier) non- interactive zero-knowledge proofs (NIZK) which parallel the familiar notion of smooth projective hash functions (SPHF). We also show that the r...
We propose an approach for constructing asymmetric nested lattice samples by randomizing asymmetric nested orthogonal arrays. Such designs possess a desirable nested structure and have attractive spac...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...