搜索结果: 1-15 共查到“Breaking”相关记录288条 . 查询时间(0.062 秒)
【有机化学学术报告】Access Molecular Complexity by Breaking Symmetry of Dicarbonyl Compounds(图)
Molecular Complexity Breaking Symmetry Dicarbonyl Compounds
font style='font-size:12px;'>
2023/6/20
【有机化学学术报告】Access Molecular Complexity by Breaking Symmetry of Dicarbonyl Compounds
A new chip for decoding data transmissions demonstrates record-breaking energy efficiency(图)
数据传输 新芯片 能源效率
font style='font-size:12px;'>
2023/6/8
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Many-body localization and quantum many-body scars: The strong and weak form of ergodicity breaking
多体定位 量子多体疤痕 遍历性断裂 强弱形式
font style='font-size:12px;'>
2023/4/23
Breaking the scaling limits of analog computing(图)
模拟计算 扩展限制 光学神经网络 超高速模拟
font style='font-size:12px;'>
2023/6/8
Engineers use artificial intelligence to capture the complexity of breaking waves(图)
人工智能 破浪 复杂性 模型预测 海洋气候模拟
font style='font-size:12px;'>
2023/6/19
中国地质大学科学技术发展院唐春安等. GPMR国家重点实验室/地学院. Nature Communications(2020). Breaking Earth’s shell into a global plate network
板块构造学;岩石圈;破裂
font style='font-size:12px;'>
2021/10/15
2020年7月17日《Nature Communications》刊发了中国地质大学外聘大地构造学科唐春安教授(第一作者)及其国际合作团队的研究新成果——“Breaking Earth’s shell into a global plate network”。该文的合作者为:大连理工大学副教授马天辉、博士研究生王永艺以及东北大学博士研究生陈甜甜、香港大学地质系 Webb 博士和美国汉普顿大学大气与...
Breaking and Fixing Anonymous Credentials for the Cloud (Full Version)
Attribute-based credentials Privacy-preserving authentication Strong authentication
font style='font-size:12px;'>
2019/9/23
In an attribute-based credential (ABC) system, users obtain a digital certificate on their personal attributes, and can later prove possession of such a certificate in an unlinkable way, thereby selec...
Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack
Bluetooth elliptic curve cryptosystem Diffie-Hellman
font style='font-size:12px;'>
2019/9/19
Bluetooth is a widely deployed standard for wireless communications between mobile devices. It uses authenticated Elliptic Curve Diffie-Hellman for its key exchange. In this paper we show that the aut...
Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance
Physically Unclonable Function Machine Learning Modelling Attack
font style='font-size:12px;'>
2019/7/15
Physical Unclonable Functions (PUFs) and, in particular, XOR Arbiter PUFs have gained much research interest as an authentication mechanism for embedded systems. One of the biggest problems of (strong...
Breaking Tweakable Enciphering Schemes using Simon's Algorithm
TES Simon's algorithm Quantum period finding algorithm
font style='font-size:12px;'>
2019/6/19
The threat of the possible advent of quantum computers has motivated the cryptographic community to search for quantum safe solutions. There have been some works in past few years showing the vulnerab...
Breaking ACORN with a Single Fault
Physical security fault attack algebraic attack
font style='font-size:12px;'>
2019/6/14
Assuring security of the Internet of Things (IoT) is much more challenging than assuring security of centralized environments, like the cloud. A reason for this is that IoT devices are often deployed ...
Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir
TFNP PPAD Nash Equilibrium
font style='font-size:12px;'>
2019/5/23
The Fiat-Shamir heuristic transforms a public-coin interactive proof into a non-interactive argument, by replacing the verifier with a cryptographic hash function that is applied to the protocol’s tra...
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis
fault attacks masking persistent
font style='font-size:12px;'>
2019/1/9
Persistent fault analysis (PFA) was proposed at CHES 2018 as a novel fault analysis technique. It was shown to completely defeat standard redundancy based countermeasure against fault analysis. In thi...
Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications
proof of liabilities Maxwell protocol summation Merkle tree
font style='font-size:12px;'>
2018/11/30
Proofs of liabilities are used for applications, function like banks or Bitcoin exchanges, to prove the sums of money in their dataset that they should owe. The Maxwell protocol, a cryptographic proof...
Breaking the confidentiality of OCB2
OCB2 confidentiality attack
font style='font-size:12px;'>
2018/11/12
OCB2 is a widely standardized mode of operation of a blockcipher that aims at providing authenticated encryption. A recent report by Inoue and Minematsu (IACR EPRINT report 2018/1040) indicates that O...