搜索结果: 1-15 共查到“scalar”相关记录225条 . 查询时间(0.125 秒)
Nonlinear mixed-effects scalar-on-function models and variable selection
Canonical correlation Functional least angle regression (fLARS) Gaussian process prior Movement data Scalar-on-function regression Variable selection
2024/1/11
This paper is motivated by our collaborative research and the aim is to model clinical assessments of upper limb function after stroke using 3D-position and 4D-orientation movement data. We present a ...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Liouville Properties on gradient shrinking Ricci solitons with constant scalar curvature
常标量 曲率梯度收缩 Ricci孤子 Liouville性质
2023/11/13
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Researches on manifolds with scalar curvature bounded from below
标量曲率 有界 流形
2023/4/25
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A Survey of Stability of Peaked Solitons I: Scalar Case
峰值孤子 稳定性 标量案例
2023/4/27
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Shape-on-Scalar Regression Models: Going Beyond Prealigned Non-Euclidean Responses
标量 形状回归模型 超越预先对齐 非欧几里得
2023/5/5
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Peakon Models I: Scalar Form
标量形式 Peakon模型 标量峰值模型
2023/5/8
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Precise late-time asymptotics for the scalar field in the interior of Kerr BH and SCC
KerrBH SCC 内部标量场 精确后期 渐近性 Kerr-Cauchy视界
2023/5/16
Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas
twisted Edwards curves Edwards curves scalar multiplication
2018/11/6
This paper addresses fast scalar multiplication for elliptic curves over finite fields. In the first part of the paper, we obtain several efficiently computable formulas for basic elliptic curves arit...
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls
Scalar Multiplication Scalar Splitting Scalar Blinding
2017/10/9
In recent years, performance counters have been used as a side channel source for the branch mispredictions which has been used to attack ciphers with user privileges. However, existing research consi...
Scalar multiplication in compressed coordinates in the trace-zero subgroup
elliptic curve cryptography trace-zero subgroup
2017/9/18
We consider trace-zero subgroups of elliptic curves over a degree three field extension. The elements of these groups can be represented in compressed coordinates, i.e. via the two coefficients of the...
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
binary elliptic curves point multiplication lambda coordinates
2017/9/7
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a twofold purpose. Firstly, we derive the most efficient 3P3P formula in λλ-projective coordinates and 5...
Speeding up Elliptic Curve Scalar Multiplication without Precomputation
Elliptic curve cryptography Scalar multiplication Montgomery ladder
2017/7/11
This paper presents a series of Montgomery scalar multiplication algorithms on general short Weierstrass curves over odd characteristic fields, which need only 12 field multiplications plus 12 ~ 20 fi...
This paper reduces the number of field multiplications required for scalar multiplication on conservative elliptic curves. For an average 256-bit integer n, this paper's multiply-by-n algorithm takes ...
Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers
Hyperelliptic curve cryptography Kummer surface genus 2
2016/12/10
We give one- and two-dimensional scalar multiplication algorithms for Jacobians of genus~2 curves that operate by projecting to Kummer surfaces, where we can exploit faster and more uniform pseudomult...
Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains
Parallel Algorithms Elliptic Curve Cryptography Scalar Multiplication
2016/12/9
This paper presents parallel scalar multiplication techniques for elliptic curve cryptography using q-based addition-subtraction k-chain which can also effectively resist side-channel attack. Many tec...