搜索结果: 1-15 共查到“Symmetric”相关记录488条 . 查询时间(0.09 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Global large strong solutions to the 2D radially symmetric compressible Navier-Stokes equations on bounded domain
有界域 二维径向对称 可压缩Navier-Stokes方程 全局大强解
2023/12/11
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Global strong solutions to the two-dimensional radially symmetric compressible MHD
二维径向对称 可压缩 磁流体动力学 全局强解
2023/12/11
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Cartan-Helgason theorem for quaternionic symmetric pairs
四元数 对称对 Cartan-Helgason定理
2023/11/7
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Bergman reproducing kernels for nearly holomorphic functions on bounded symmetric domains
伯格曼 有界对称域 近乎全纯函数 核
2023/4/17
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars: Bergman reproducing kernels for nearly holomorphic functions on bounded symmetric domains
伯格曼 有界对称域 近乎全纯函数 核
2023/4/23
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Zeros of complete symmetric polynomials over finite fields
有限域 完全对称 多项式 零点
2023/4/13
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy
Dynamic Searchable Symmetric Encryption Forward Privacy Backward Privacy
2019/9/19
Dynamic Searchable Symmetric Encryption (DSSE) enables a client to perform updates and searches on encrypted data which makes it very useful in practice. To protect DSSE from the leakage of updates (l...
Security of Symmetric Primitives against Key-Correlated Attacks
Key-correlated attack related-key attack key-dependent-message attack
2019/9/5
We study the security of symmetric primitives against key-correlated attacks (KCA), whereby an adversary can arbitrarily correlate keys, messages, and ciphertexts. Security against KCA is required whe...
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography
Security protocols Authenticated key exchange Symmetric-key cryptography
2019/8/13
With the rise of the Internet of Things and the growing popularity of constrained end-devices, several security protocols are widely deployed or strongly promoted (e.g., Sigfox, LoRaWAN, NB-IoT). Base...
Count of rotational symmetric bent Boolean functions
Rotational Symmetric Boolean Function Algebraic Normal Form Bent Boolean Function
2019/8/2
Counting the Boolean functions having specific cryptographic features is an interesting problem in combinatorics and cryptography. Count of bent functions for more than eight variables is unexplored. ...
Multi-Client Symmetric Searchable Encryption with Forward Privacy
Cloud Security Forward Privacy Multi-Client Symmetric Searchable Encryption
2019/7/15
Symmetric Searchable encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data, in a way that the privacy of both the files and the search que...
Scalable Private Set Union from Symmetric-Key Techniques
Private Set Union Private Membership Test
2019/7/4
We present a new efficient protocol for computing private set union (PSU). Here two semi-honest parties, each holding a dataset of known size (or of a known upper bound), wish to compute the union of ...
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Cloud Security Storage Protection Access Control, Policies
2019/6/12
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some int...
Securely managing encrypted data on an untrusted party is a challenging problem that has motivated the study of a variety of cryptographic primitives. A special class of such primitives allows an untr...
With this work, we intend on demonstrating the need for improvements to the currently standardized AES family of cryptosystems, and provide a solution that meets the requirements of long-term security...