>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到characteristic相关记录290条 . 查询时间(0.109 秒)
This is a periodic series learning seminar organized by Koji Shimizu and Shizhang Li on prismatic F-gauges held on each Monday at MCM110. More info can be found on the website.
Discuss [Bha, §4.4-4.5]. One reasonable plan is to focus on §4.5 and use it as motivation to introduce materials in §4.4. This is a periodic series learning seminar organized by Koji Shimizu and Shiz...
Discuss [Bha, §4.1-4.3]. Introduce Definitions 4.1.1 & 4.2.1, and mention (some of) their properties buried in the remarks; then discuss Example 4.2.6, Proposition 4.3.1, Example 4.3.3, Definition 4.3...
Discuss [Bha, §2.3-2.4]. See [Dri20, §1.3] for the notion of cones and quasi-ideals. Note that some of the remarks (e.g. Remark 2.2.15) [Bha, §2.2] may not have been covered in Lecture 1. Explain them...
We prove that the discrete logarithm problem can be solved in quasi-polynomial expected time in the multiplicative group of finite fields of fixed characteristic. More generally, we prove that it can ...
TRIFLE is a Round 1 candidate of the NIST Lightweight Cryptography Standardization process. In this paper, we present an interesting 1-round iterative differential characteristic of the underlying blo...
Let pp be a small prime and n=n1n2>1n=n1n2>1 be a composite integer. For the function field sieve algorithm applied to FpnFpn, Guillevic (2019) had proposed an algorithm for initial splitting of the t...
At present the land subsidence has been the main geological disaster in the plain area of China, and became one of the most serious disaster that restrict the social and economic sustainable developme...
A central goal of the program is to further connections between problems in infinite and finite dimensioQLAWS1_imagenal linear algebra. This workshop will focus on the expected characteristic polynomi...
In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemes whi...
Three decades ago, Montgomery introduced a new elliptic curve model for use in Lenstra's ECM factorization algorithm. Since then, his curves and the algorithms associated with them have become foundat...
Impossible differential attack is one of powerful methods for analyzing encryption algorithms. When designing cryptographic algorithms, it must be safe for impossible differential attacks. In case of ...
Since 2013 there have been several developments in algorithms for computing discrete logarithms in small-characteristic finite fields, culminating in a quasi-polynomial algorithm. In this paper, we re...
The algorithm presented in this paper computes a maximum probability differential characteristic in a Substitution-Permutation Network (or SPN). Such characteristics can be used to prove that a cipher...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...