>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Strong相关记录474条 . 查询时间(0.075 秒)
Silver fir is one of the longest living and tallest trees in Europe, it has major commercial importance and may be found in various communities predominantly connected with lower mountainous locations...
Cross-linking is often performed to overcome the weak mechanical properties of native polymer films in order to expand their functional properties and applications. While this approach offers enhanced...
Recently, hydrogels with adjustable mechanical properties have been developed for information security applications. However, the defects such as easy drying and inferior resistance to extreme tempera...
DFT calculations have identified reaction pathways for acetic acid synthesis from CO2 and CH4 on ZnO, Cu/ZnO and Fe/ZnO surfaces. Fe/ZnO exhibits strong synergy in facilitating CH4 activation, dissoci...
Salt stress is an important factor that limits rice yield. We identified a novel, strongly salt tolerant rice landrace called Changmaogu (CMG) collected from a coastal beach of Zhanjiang, Guangdong Pr...
Cellulose nanopaper, which consists of a porous network of cellulose nanofibrils (CNFs), exhibits excellent mechanical properties with high strength and toughness. The physical mechanisms, including a...
This paper deals with (1) asymptotics of ``strongly-multiplicative'' arithmetic secret sharing over an arbitrary fixed ring Rℓ:=Z/pℓZ (p>0 prime, ℓ>0 an integer) and supporting an un...
Non-zero inner product encryption (NIPE) allows a user to encrypt a message with its attribute vector and decryption is possible using a secret-key associated with a predicate vector if the inner prod...
Strong Asymmetric PAKE based on Trapdoor CKEM     PAKE  ROM       2019/6/5
Password-Authenticated Key Exchange (PAKE) protocols allow two parties that share a password to establish a shared key in a way that is immune to oine attacks. Asymmetric PAKE (aPAKE) [21] adapts thi...
Proxy Re-Encryption (PRE), introduced by Bellare et. al, allows a ciphertext encrypted using a key pki to be re-encrypted by a third party so that it is an encryption of the same message under a new k...
In this note, we show that a strong notion of KDM security cannot be obtained by any encryption scheme in the auxiliary input setting, assuming Learning With Errors (LWE) and one-way permutations. The...
The key observation underlying our approach is that Rudich's impossibility result applies not only to one-way functions as the underlying primitive, but in fact to a variety of "unstructured'' primiti...
Leakage-resilient encryption is a powerful tool to protect data confidentiality against side channel attacks. In this work, we introduce a new and strong leakage setting to counter backdoor (or trojan...
Recently, Chen et al. proposed the first non-delegatable certificateless strong designated verifier signature scheme and claimed that their scheme achieves all security requirements. However, in this ...
An interesting consequence of our results is a potential new avenue for bypassing black-box separations. In particular, proving (with necessarily non-black-box techniques) that parallel repetition amp...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...