>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到prime相关记录184条 . 查询时间(0.062 秒)
蛋白纯化仪 (GE AKTA Prime plus)
引导编辑(prime editing,PE)是David Liu实验室新开发的精准基因编辑系统:在PE向导RNA(pegRNAs)的引导下,逆转录酶MMLV与nCas9组成的融合蛋白可实现四种碱基之间的自由替换,以及目标位点碱基的精准插入与删除(详见BioArt报道:专家点评Nature | David Liu再出重磅基因编辑新工具,可实现碱基随意转换与增删)【1】。绝大多数致病遗传变异都是碱基点...
基因组编辑技术可以定向修饰植物基因组,从而大大加速植物育种的进程,是实现作物精准育种的重要技术突破。然而,作物的许多重要农艺性状是由基因组中的单个或少数核苷酸的改变或突变造成的。基于CRISPR/Cas系统的基因组编辑,可利用外源修复模板通过同源重组介导的修复方式(HDR)实现目标基因特定核苷酸的改变。目前,同源重组在植物中的效率非常低,很难以此方式实现高效、稳定的植物基因组的精准编辑。CRISP...
探讨Axium? Prime 系列弹簧圈在颅内破裂微小动脉瘤栓塞中的安全性及临床效果。方法 回顾性分析2017年1月至2018年6月使用Axium? Prime 系列弹簧圈栓塞治疗的32例颅内破裂微小动脉瘤的临床资料,其中LVIS支架辅助栓塞15例,单纯弹簧圈栓塞17例。
Diffie-Hellman groups are a widely used component in cryptographic protocols in which a shared secret is needed. These protocols are typically proven to be secure under the assumption they are impleme...
This paper addresses fast scalar multiplication for elliptic curves over finite fields. In the first part of the paper, we obtain several efficiently computable formulas for basic elliptic curves arit...
Efficient scalar multiplication algorithms require a single finite field inversion at the end to convert from projective to affine coordinates. This inversion consumes a significant proportion of the ...
For years, researchers have been engaged in finding new cryptography schemes with high security and efficiency that can resist against the attacking from quantum computers. Lattice-based cryptography ...
This work provides a systematic analysis of primality testing under adversarial conditions, where the numbers being tested for primality are not generated randomly, but instead provided by a possibly ...
Private linear key agreement (PLKA) enables a group of users to agree upon a common session key in a broadcast encryption (BE) scenario, while traitor tracing (TT) system allows a tracer to identify c...
In contrast to related work which encrypts and acts on each bit of the input separately, our protocol compares multiple input bits simultaneously within a single ciphertext. Compared to the related pr...
Among all existing identity-based encryption (IBE) schemes in the bilinear group, Wat-IBE proposed by Waters [CRYPTO, 2009] and JR-IBE proposed by Jutla and Roy [AsiaCrypt, 2013] are quite special. A ...
Generic non-interactive zero-knowledge (NIZK) proofs can be used to prove such properties. However, generic NIZK proofs are not practical at all. For some very specific properties, specialized proofs ...
Attrapadung (Eurocrypt 2014) proposed a generic framework called pair encoding to simplify the design and proof of security of CPA-secure predicate encryption (PE) instantiated in composite order grou...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...