>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Explicit相关记录189条 . 查询时间(0.109 秒)
The recent post-quantum cryptography standardization project launched by NIST increased the interest in generic key encapsulation mechanism (KEM) constructions in the quantum random oracle (QROM). Bas...
Non-malleable codes (NMCs), introduced by Dziembowski, Pietrzak and Wichs (ITCS 2010), generalize the classical notion of error correcting codes by providing a powerful guarantee even in scenarios whe...
Children's abilities to process the phonological structure of words are important predictors of their literacy development. In the current study, we examined the interrelatedness between implicit (i.e...
Much research has been devoted to studies of and algorithms for memory management based on garbage collection or explicit allocation and deallocation. An alternative approach, region-based memory mana...
We present a technique to mine explicit information flow specifications from concrete executions. These specifications can be consumed by a static taint analysis, enabling static analysis to work even...
App stores are increasingly the preferred mechanism for distributing software, including mobile apps (Google Play),desktop apps (Mac App Store and Ubuntu Software Center),computer games (the Steam Sto...
The notion of non-malleable codes was introduced as a relaxation of standard error-correction and error-detection. Informally, a code is non-malleable if the message contained in a modified codeword...
We present explicit optimal binary pebbling algorithms for reversing one-way hash chains. For a hash chain of length 2k , the number of hashes performed in each output round does not exceed dk/2e, ...
We present an efficient endomorphism for the Jacobian of a curve C of genus 2 for divisors having a Non disjoint support. This extends the work of Costello in [12] who calculated explicit formul?for ...
A non-malleable code protects messages against various classes of tampering. Informally, a code is non-malleable if the message contained in a tampered codeword is either the original message, or a ...
Linear approximations of modular addition modulo a power of two was studied by Wallen in 2003. He presented an efficient algorithm for computing linear probabilities of modular addition. In 2013 Scult...
This study investigates the ability of students with and without learning disabilities to learn a phonics rule implicitly and the ability of these students to report accurately about the rule verbally...
Let F be a global function field and let F ab be its maximal abelian extension. Following an approach of D. Hayes, we shall construct a continuous homomorphism ρ: Gal(F ab/F) → CF , where CF is the id...
We gives an explicit genus 3 curve over Q such that the Galois action on the torsion points of its Jacobian is a large as possible. That such curves exist is a consequence of a theorem of D. Zureick-B...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...