搜索结果: 1-15 共查到“Design And Analysis”相关记录27条 . 查询时间(0.163 秒)
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Block cipher linear cryptanalysis FPGA
2019/1/9
Secure block cipher design is a complex discipline which combines mathematics, engineering, and computer science. In order to develop cryptographers who are grounded in all three disciplines, it is ne...
IUTAM Symposium on Mechanical design and analysis for AM technologies (AMT 2018)
IUTAM Seminar Mechanical design Analysis technology
2017/12/13
IUTAM Symposium on Mechanical design and analysis for AM technologies (AMT 2018).
We discuss the design rationale and analysis of the SIMON and SPECK lightweight block ciphers.
Simplifying Design and Analysis of Complex Predicate Encryption Schemes
predicate encryption attribute-based encryption bilinear maps
2017/3/9
Wee (TCC'14) and Attrapadung (Eurocrypt'14) introduced predicate and pair encodings, respectively, as a simple way to construct and analyze attribute-based encryption schemes, or more generally predic...
Graph-theoretic design and analysis of key predistribution schemes
Key predistribution schemes network security combinatorial designs
2016/1/9
Key predistribution schemes for resource-constrained networks are methods for allocating symmetric keys to devices
in such a way as to provide an efficient trade-off between key storage, connectivity...
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
authentication code non-uniformly random key information-theoretic security
2016/1/3
The authentication code (A-code) is the one of the most fundamental cryptographic protocols in information-theoretic cryptography, and it provides information-theoretic integrity or authenticity, i.e....
Optimizing Design and Analysis of Industrial Photogrammetric Network
Robotics Interior Elements Industrial Photogrammetric Network Design
2015/12/14
Mainly task of optimizing design of Industrial Photogrammetric Network with Variant Interior Elements (IPNVIE) is to provide a
schema for a set of interior relatively problems in a photographic task....
A skywave signal is one has propagated by reflecting off the ionosphere. These signals are common in low frequency (LF) broadcast. However, in Loran, these signals are nuisances since they interfere w...
Design And Analysis Of A Hub For A 50-Horsepower, Three Bladed Wind Energy Conversion System
Design And Analysis A 50-Horsepower Three Bladed Wind Energy Conversion System
2014/11/4
Design And Analysis Of A Hub For A 50-Horsepower, Three Bladed Wind Energy Conversion System.
De-randomizing Shannon: The Design and Analysis of a Capacity-Achieving Rateless Code
De-randomizing Shannon Analysis of a Capacity-Achieving Rateless Code Information Theory
2012/6/15
This paper presents an analysis of spinal codes, a class of rateless codes proposed recently. We prove that spinal codes achieve Shannon capacity for the binary symmetric channel (BSC) and the additiv...
Comparison of Design and Analysis of Concrete Gravity Dam
Comparison Concrete Gravity Dam Dam Failure Design Earthquake Intensity Perturbation Stability and Stress
2013/3/8
Gravity dams are solid concrete structures that maintain their stability against design loads from the geometric shape, mass and strength of the concrete. The purposes of dam construction may include ...
Accountability of Centralized Payment Systems: Formal Reasoning, Protocol Design and Analysis
Accountability Electronic payment Formal method Key generation and distribution Payment protocols
2011/9/26
Accountability is one of the most critical security properties of electronic payment protocols. It can be used to resolve disputes among involved parties. Several formal logics were proposed for reaso...
Accountability of Centralized Payment Systems: Formal Reasoning, Protocol Design and Analysis
Accountability Electronic payment Formal method Key generation and distribution Payment protocols
2011/9/26
Accountability is one of the most critical security properties of electronic payment protocols. It can be used to resolve disputes among involved parties. Several formal logics were proposed for reaso...
Design and Analysis of a Mechanical Device to Harvest Energy From Human Footstep Motion
energy harvesting dual-oscillating mechanism human motion
2011/8/5
Portable electronics is usually powered by battery, which is not sustainable not only to the longtime outdoor use but also to our living environment.
Design and Analysis of Gecko-like Robot
geckolike structure design gait planning groundtowall
2011/8/4
Geckolike robot (Geckobot), an important branch of bionic robotics, is a robot that simulates gecko’s capacity to climb walls and ceilings. The work environment of the traditional wallclimbing robot i...