搜索结果: 1-15 共查到“both schemes”相关记录647条 . 查询时间(0.578 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Some new algorithm developments on highly stiff stable schemes and on a SAV based approach for optimization problems
高刚性稳定方案 基于SAV 优化方法 新算法发展
2023/11/29
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:An inverse Lax-Wendroff procedure for finite difference schemes on the Cartesian grids
笛卡尔网格 有限差分格式 Lax-Wendroff逆过程
2023/11/13
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Building private information retrieval schemes over binary fields
二进制字段 私有信息 检索方案
2023/4/21
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Borel—Wei—Bott theorem for Derived Flag Schemes
派生 标志方案 博雷尔-魏-博特定理
2023/4/13
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:The de Rham cohomology of p-adic formal schemes
p-adic形式方案 德拉姆 上同调
2023/4/18
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Energy stability of exponential time differencing schemes for the nonlocal Cahn-Hilliard equation
非局部 Cahn-Hilliard方程 指数时间 差分方案 能量稳定性
2023/4/24
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Splitting Numerical Schemes for Two-dimensional Maxwell-Debye Equations
二维 麦克斯韦-德拜方程组 拆分数值方案
2023/4/27
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:System Control Schemes based on Actor-Critic Learning Algorithms
Actor-Critic学习算法 系统 控制方案
2023/4/27
Subversion-Resistant Commitment Schemes: Definitions and Constructions
Commitment schemes subversion security common reference string model
2019/9/23
A commitment scheme allows a committer to create a commitment to a secret value, and later may open and reveal the secret value in a verifiable manner. In the common reference string model, commitment...
Modeling Memory Faults in Signature and Encryption Schemes
fault attacks security model fault resilience deterministic signatures
2019/9/19
Memory fault attacks, inducing errors in computations, have been an ever-evolving threat to cryptographic schemes since their discovery for cryptography by Boneh et al. (Eurocrypt 1997). Initially req...
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Lattice based cryptography side-channel attacks CCA transformation
2019/8/21
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Security analysis of two lightweight certificateless signature schemes
Certificateless cryptography Cryptanalysis Signature
2019/8/19
Certificateless cryptography can be considered as an intermediate solution to overcome the issues in traditional public key infrastructure (PKI) and identity-based public key cryptography (ID-PKC). Th...
In this work we apply the systematic approach of game-based security specifications and proofs by reductions, to the design and evaluation of public key infrastructure (PKI) schemes. The importance of...
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
Logic Locking Optical Contactless Probing Tamper-proof Memory
2019/6/19
Logic locking has been proposed as an obfuscation technique to protect outsourced IC designs from Intellectual Property (IP) piracy by untrusted entities in the design and fabrication process. It obfu...
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
TES Simon's algorithm Quantum period finding algorithm
2019/6/19
The threat of the possible advent of quantum computers has motivated the cryptographic community to search for quantum safe solutions. There have been some works in past few years showing the vulnerab...