>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学
搜索结果: 1-15 共查到lattice相关记录692条 . 查询时间(0.078 秒)
Lattice reduction algorithms have been proved to be one of the most powerful and versatile tools in public key cryptanalysis. In this talk, we primarily concentrate on lattice attacks against (EC)DSA ...
Dyck paths are classical Catalan objects. The peak distribution of Dyck paths is an important topic of combinatorics, and further the representation of symmetric groups.
Liouville quantum gravity (LQG) is a theory of random surfaces that originated from string theory. Schramm Loewner evolution (SLE) is a family of random planar curves describing scaling limits of many...
A model system created by stacking a pair of monolayer semiconductors is giving physicists a simpler way to study confounding quantum behavior, from heavy fermions to exotic quantum phase transitions.
The full Kostant-Toda lattice defined on simple Lie algebras can be viewed as finite version of KP type hierarchies. In this talk I will show you how to explicitly construct (all) rational solutions o...
The theory of tetragonal curves is established and first applied to the study of algebro-geometric quasi-periodic solutions of discrete soliton equations. Using the zero-curvature equation and the dis...
The Shortest Vector Problem (SVP) is one of the mathematical foundations of lattice based cryptography. Lattice sieve algorithms are amongst the foremost methods of solving SVP. The asymptotically fas...
Multi-proxy multi-signature schemes are useful in distributed networks, where a group of users cooperatively could delegate their administrative rights to the users of another group, who are authorize...
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
With the rising popularity of lattice-based cryptography, the Learning with Errors (LWE) problem has emerged as a fundamental core of numerous encryption and key exchange schemes. Many LWE-based schem...
We introduce the WIDESEAS protocol for lattice-based Private Information Retrieval (PIR), and we give performance numbers for its recent implementation in the EncryptedQuery open-source PIR software. ...
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes. In particular, we extend the practicality of skip-addition fault attacks thro...
In this paper, we introduce a new construction of lattice-based reusable fuzzy signature for remote user authentication that is secure against quantum computers. We define formal security models for t...
We provide new zero-knowledge argument of knowledge systems that work directly for a wide class of language, namely, ones involving the satisfiability of matrix-vector relations and integer relations ...
Leakage during the signing process, including partial key exposure and partial (or complete) randomness leakage, may be devastating for the security of digital signatures. In this work, we consider th...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...