搜索结果: 1-15 共查到“Q-matrix”相关记录800条 . 查询时间(0.282 秒)
Exploring the effects of bound rubber phase on the physical properties of nano-silica composites with a vitrimer-like bond exchangeable matrix
DYNAMIC COVALENT CHEMISTRY CROSS-LINK DENSITY MECHANICAL-PROPERTIES POLYMER NANOCOMPOSITES
2023/11/30
We demonstrate the preparation and unique properties of composite vitrimer-like materials containing silica nanoparticles (SNPs). The matrix is composed of polyacrylate-based polymers crosslinked via ...
Carbon fiber-reinforced epoxy composite properties improvement by incorporation of polydopamine sizing at fiber-matrix interface
CF EP composites Interface polydopamine sizing
2023/11/16
To gain better interfacial and mechanical performances of carbon fiber-reinforced epoxy resin (CF/EP) composites, the surface modification of CF was carried out via a simple mild method. The polydopam...
Development of decellularized meniscus extracellular matrix and gelatin/chitosan scaffolds for meniscus tissue engineering
Meniscus extracellular matrix compressive elastic modulus cytotoxicity
2023/3/1
Meniscus tissue engineering has provided a great potential treatment for meniscal injuries. However, few scaffolds in meniscus tissue engineering have matched the mechanical properties of native menis...
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Low Rank Matrix Recovery for Seismic Data Analysis and Blind Superresolution
地震数据分析 盲超分辨率 低秩 矩阵恢复
2023/4/19
Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract)
MPC with preprocessing correlated randomness optimal round complexity
2019/9/16
We present preprocessing-MPC schemes of arithmetic functions with optimal round complexity, function-independent correlated randomness, and communication and space complexities that grow linearly with...
Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles
IoV security analysis matrix encryption
2019/7/23
Internet of Things (IoT) has various applications such as healthcare, supply chain, agriculture, etc. Using the Internet of Vehicles(IoV) to control traffic of the cities is one of the IoT application...
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats
Lattice based cryptography Discrete Gaussian sampling Matrix decomposition
2019/4/1
Many advanced lattice based cryptosystems require to sample lattice points from Gaussian distributions. One challenge for this task is that all current algorithms resort to floating-point arithmetic (...
Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics
Homomorphic encryption approximate arithmetics matrix operations
2019/1/4
HEAAN is a homomorphic encryption (HE) scheme for approximate arithmetics. Its vector packing technique proved its potential in cryptographic applications requiring approximate computations, including...
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH
Pseudorandom functions LWE MDDH
2018/11/19
We construct efficient and tightly secure pseudorandom functions (PRFs) with only logarithmic security loss and short secret keys. This yields very simple and efficient variants of well-known construc...
Secure Outsourced Matrix Computation and Application to Neural Networks
Homomorphic encryption matrix computation machine learning
2018/11/2
Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and security issues in outsourcing computation on sensitive data to an untrusted computation environment. Comparing...
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE
Binary matrix LWE Linear Programming Cryptanalysis
2018/8/16
We consider Galbraith's space efficient LWE variant, where the (m×n)(m×n)-matrix AA is binary. In this binary case, solving a vectorial subset sum problem over the integers allows for decryption. We s...
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
secure linear algebra multiparty computation
2018/8/2
Cramer and Damgård were the first to propose a constant-rounds protocol for securely solving a linear system of unknown rank over a finite field in multiparty computation (MPC). For mm linear equ...
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption
Secure matrix multiplications Leveled fully homomorphic encryption Packing methods
2018/7/10
Secure matrix computation is one of the most fundamental and useful operations for statistical analysis and machine learning with protecting the confidentiality of input data. Secure computation can b...
Randomness analysis for multiple-recursive matrix generator
Linear feedback shift register stream cipher randomness
2018/6/19
Randomness testing of binary sequences generated by any keystream generator is of paramount importance to both designer and attacker. Here we consider a word-oriented keystream generator known as mult...
Homomorphic Encryption for Approximate Matrix Arithmetic
Homomorphic encryption approximate arithmetic matrix multiplication
2018/6/5
Homomorphic Encryption for Arithmetic of Approximate Numbers (HEAAN) with its vector packing technique proved its potential in cryptographic applications. In this paper, we propose MHEAAN - a generali...