搜索结果: 1-15 共查到“Correlation”相关记录714条 . 查询时间(0.109 秒)
Correlation of Leaf and Root Traits of Two Angiosperm Tree Species in Northeast China under Contrasting Light and Nitrogen Availabilities
leaf-specific traits leaf morphology root morphology leaf mass per area leaf density specific root length specific root area root tissue density
2023/12/19
Thinning is an important management practice for reducing plant competition and improving wood production in forests. The residues from thinning can contain large amounts of carbon (C) and nitrogen (N...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Model-free conditional screening for ultrahigh-dimensional survival data via conditional distance correlation
条件距离 相关性 超高维 生存数据 无模型 条件筛选
2023/5/4
Physicists find direct evidence of strong electron correlation in a 2D material for the first time(图)
二维材料 强电子 相关性 非常规超导性
2023/6/7
Inheritance and Correlation Analysis of Pulpwood Properties, Wood Density, and Growth Traits of Slash Pine
Growth Traits Slash Pine Pulpwood Properties Wood Density
2023/6/5
New Paper Published in Nature Communications titled, “Exact exchange-correlation potentials from ground-state electron densities”
Published titled Exact potentials electron densities
2019/10/10
The quest for accurate exchange-correlation functionals has long remained a grand challenge in density functional theory (DFT), as it describes the many-electron quantum mechanical behavior through a ...
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet
Small-state stream cipher Grain Correlation attack
2019/7/15
Many cryptographers have focused on lightweight cryptography, and a huge number of lightweight block ciphers have been proposed. On the other hand, designing lightweight stream ciphers is a challengin...
Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
Fast correlation attack Stream cipher Grain-like
2019/7/8
The fast correlation attack (FCA) is one of the most important cryptanalytic techniques against LFSR-based stream ciphers. In CRYPTO 2018, Todo et al. found a new property for the FCA and proposed a n...
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More
Secure computation correlated randomness pseudorandom correlation generator
2019/5/9
Secure multiparty computation (MPC) often relies on sources of correlated randomness for better efficiency and simplicity. This is particularly useful for MPC with no honest majority, where input-inde...
Horizontal Collision Correlation Attack on Elliptic Curves
side-channel analysis elliptic curves implementations ECDSA
2019/4/1
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certicates and of being rel...
Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields
symmetric cryptography stream cipher correlation attack
2019/3/20
We propose a general method for security evaluation of SNOW 2.0-like ciphers against correlation attacks that are built similarly to known attacks on SNOW 2.0. Unlike previously known methods, the met...
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS
Quadratic Boolean function Disjoint quadratic form Correlation attack
2019/3/1
We show that the correlation of any quadratic Boolean function can be read out from its so-called disjoint quadratic form. We further propose a polynomial-time algorithm that can transform an arbitrar...
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
Symmetric-key cryptography tweakable block ciphers zero-correlation
2019/3/1
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, ...
Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure FHE
NIZK LWE
2019/1/4
We construct non-interactive zero-knowledge (NIZK) arguments for NPNP from any circular-secure fully homomorphic encryption (FHE) scheme. In particular, we obtain such NIZKs under a circular-secure va...
Block Cipher Invariants as Eigenvectors of Correlation Matrices
invariant subspace attack nonlinear invariant attack linear cryptanalysis
2018/8/21
A new approach to invariant subspaces and nonlinear invariants is developed. This results in both theoretical insights and practical attacks on block ciphers. It is shown that, with minor modification...
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1
Fast correlation attack Stream cipher LFSR
2018/6/5
A fast correlation attack (FCA) is a well-known cryptanalysis technique for LFSR-based stream ciphers. The correlation between the initial state of an LFSR and corresponding key stream is exploited, a...