搜索结果: 1-15 共查到“proof”相关记录319条 . 查询时间(0.069 秒)
Sweat-proof “smart skin” takes reliable vitals, even during workouts and spicy meals(图)
智能皮肤 传感器 可穿戴监视器
2023/6/7
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A simpler proof of the Frank-Lieb inequality on the Heisenberg group
海森堡群 Frank-Lieb inequality 更简单证明
2023/4/14
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Berndtsson’s proof of the Bourgain-Milman theorem
伯恩松 布尔根-米尔曼定理 证明
2023/4/28
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A constructive proof of finite time blowup of 3D incompressible Euler equations with smooth data
光滑数据 三维不可压缩 欧拉方程 有限时间爆破 构造性证明
2023/5/10
“Magic-angle” trilayer graphene may be a rare, magnet-proof superconductor(图)
三层石墨烯 防磁超导体 MRI机器 量子计算机
2023/6/7
A Machine-Checked Proof of Security for AWS Key Management Service
Provable-Security Machine-Checked Proof Key Management
2019/9/19
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
Halo: Recursive Proof Composition without a Trusted Setup
zero knowledge elliptic curve cryptosystem
2019/9/16
Non-interactive proofs of knowledge allow us to publicly demonstrate the faithful execution of arbitrary computations. SNARKs have the additional property of succinctness, meaning that the proofs are ...
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Puncturable Signatures PoS Blockchain
2019/8/30
Proof-of-stake (PoS) blockchain protocols are emerging as one of the most promising alternative to the energy-consuming proof-of-work protocols. However, one particularly critical threat in the PoS se...
A hash function family is called correlation intractable if for all sparse relations, it hard to find, given a random function from the family, an input output pair that satisfies the relation. Correl...
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Blockchain Consensus Clock Synchronization
2019/7/22
Proof-of-stake (PoS) has been shown to be a suitable replacement—in many respects—for the expensive proof-of-work mechanism introduced by the Bitcoin protocol. Nevertheless, one common and seemingly i...
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Kerberos authenticated key exchange
2019/7/10
Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default ...
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
Cryptocurrencies blockchain smart contracts
2019/7/4
The feasibility of bribing attacks on cryptocurrencies was first highlighted in 2016, with various new techniques and approaches having since been proposed. Recent reports of real world 51%51% attacks...
We reveal Revelio, a new privacy-preserving proof of reserves protocol for Grin exchanges. By design, Revelio allows the detection of collusion between exchanges while hiding the identities of the out...
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
threshold cryptography two-party ECDSA
2019/5/21
ECDSA is a widely adopted digital signature standard. Unfortunately, efficient distributed variants of this primitive are notoriously hard to achieve and known solutions often require expensive zero k...
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
public-key encryption leakage-resilience CCA security
2019/5/21
We propose the concept of quasi-adaptive hash proof system (QAHPS), where the projection key is allowed to depend on the specific language for which hash values are computed. We formalize leakage-resi...