>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Timing相关记录244条 . 查询时间(0.317 秒)
A broad analysis has identified genetic variants that influence age at natural menopause. The results implicate mechanisms such as DNA-damage repair and give insights into the potential for predicting...
In this paper, we present a practicable chosen ciphertext timing attack retrieving the secret key of HQC. The attack exploits a correlation between the weight of the error to be decoded and the runnin...
As one of the most efficient lattice-based signature schemes, and one of the only ones to have seen deployment beyond an academic setting (e.g., as part of the VPN software suite strongSwan), BLISS ha...
In the 1960s, University of Pennsylvania biologist Dan Janzen re-described what has become a classic example of biological mutualism: the relationship between acacia-ants and ant-acacia trees. The aca...
Very little is known about how the onset of puberty is controlled in humans, but an NSF-funded discovery of a new gene in the roundworm C. elegans could be the "missing link" that determines the juven...
While error correcting codes (ECC) have the potential to significantly reduce the failure probability of post-quantum schemes, they add an extra ECC decoding step to the algorithm. As this additional ...
Many secure cache designs have been proposed in literature with the aim of mitigating different types of cache timing-based side-channel attacks. However, there has so far been no systematic analysis ...
2018年,国际石油地质重要期刊《AAPG Bulletin》刊发了两篇中国地质大学关于四川盆地周缘矿山梁和米仓山震旦-寒武古油藏形成和演化的研究成果。资源学院构造与油气资源教育部重点实验室博士葛翔为文章的第一作者,导师沈传波教授为通讯作者。
In this paper we provide a formal treatment of proof of replicated storage, a novel cryptographic primitive recently proposed in the context of a novel cryptocurrency, namely Filecoin.
Software side channel attacks have become a serious concern with the recent rash of attacks on speculative processor architectures. Most attacks that have been demonstrated exploit the cache tag state...
The traditional timing discrimination technique for laser rangefinding in remote sensing, which is lower in measurement performance and also has a larger error, has been unable to meet the high precis...
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant...
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This proposal uses an iterative bi...
The origin, age and evolution of the Precambrian metamorphic basement of southern China provide useful insights into early crustal development. Here, we present new laser ablation–inductively coupled ...
Background: Weight gain and obesity have reached alarming levels. Eating at a later clock hour is a newly described risk factor for adverse metabolic health; yet, how eating at a later circadian time ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...