>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到log P相关记录166条 . 查询时间(0.062 秒)
The unimodality of lower Bruhat intervals for the “upper half” remains as an open problem. For affine Weyl group W with corresponding finite Weyl group W_f, we prove that lower W_f-parabolic Bruhat in...
In 2012, Boroczky, Lutwak, Yang, and Zhang posed the log-Brunn-Minkowski conjecture, which represents an enhanced version of the classical Brunn-Minkowski inequality for convex bodies. We will recall ...
This work revisits zero-knowledge proofs in the discrete logarithm setting. First, we identify and carve out basic techniques (partly being used implicitly before) to optimize proofs in this setting. ...
Consider a PPT two-party protocol Π=(A,B)Π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB∈{0,1}OA,OB∈{0,1}, and let VAVA and VBVB denote the parties' individual views. Proto...
Monero is the largest cryptocurrency with built-in cryptographic privacy features. The transactions are authenticated using spend proofs, which provide a certain level of anonymity by hiding the sourc...
In applications of fully-homomorphic encryption (FHE) that involve computation on encryptions produced by several users, it is important that each user proves that her input is indeed well-formed. Thi...
了解叶酸增补认知对叶酸服用的影响,为妇幼保健部门提高叶酸增补干预效率、改善出生结局提供数据支撑。 方法 分析2016年7 — 8月在陕西省10个地级市和杨凌示范区开展的横断面调查数据,采用问卷调查方法对1 495名近3年有过生育史或正在怀孕的育龄妇女围孕期叶酸服用状况和叶酸增补认知情况进行调查,采用log-binomial模型分析叶酸增补认知对叶酸服用状况的影响,估计现患比(prevalen...
The distributed discrete logarithm (DDL) problem was introduced by Boyle et al. at CRYPTO 2016. A protocol solving this problem was the main tool used in the share conversion procedure of their homomo...
The last decade has witnessed an increasing interest in the study of acoustic/elastic metamaterials and their potential engineering applications. Acoustic/elastic metamaterials are a class of composit...
Mobile Mapping System (MMS) simultaneously collects the Lidar points and video log images in a scenario with the laser profiler and digital camera. Besides the textural details of video log images, it...
We provide a zero-knowledge argument for arithmetic circuit satisfiability with a communication complexity that grows logarithmically in the size of the circuit. The round complexity is also logarit...
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the devices on which they are implemented leak information to the adversary. One of the ma...
In this report we describe our efforts in analysing log files produced by the Estonian i-voting system in the KOV2013, EP2014 and RK2015 elections in combination with other information available, so a...
We consider the Fourier Entropy-Influence (FEI) conjecture in the context of cryptographic Boolean functions. We show that the FEI conjecture is true for the functions satisfying the strict avalanch...
This article describes a number of log-linear parsing models for an automatically extracted lexicalized grammar. The models are “full parsing models in the sense that probabilities are defined for co...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...