搜索结果: 1-15 共查到“Channels”相关记录316条 . 查询时间(0.1 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Unconditional stability and error estimates of FEMs for the electro-osmotic flow in micro-channels
微通道 电渗流FEM 无条件稳定性 误差估计
font style='font-size:12px;'>
2023/5/15
清华大学殷柳国教授来中北大学信息与通信工程学院作“Generalized Sparse Codes for Non-Gaussian Channels: Code Design,Algorithms, and Applications”专题报告(图)
清华大学 殷柳国 中北大学信息与通信工程学院 广义随机编码 抗干扰 通信编码
font style='font-size:12px;'>
2022/11/24
Device channels heat into light(图)
Device channels heat into light
font style='font-size:12px;'>
2019/10/22
A humble carbon nanotube may be just the device to make solar panels -- and anything else that loses energy through heat -- far more efficient.NSF-funded scientists at Rice University are designing ar...
Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation
oblivious transfer differential privacy hardness amplification
font style='font-size:12px;'>
2019/6/4
Consider a PPT two-party protocol Π=(A,B)Π=(A,B) in which the parties get no private inputs and obtain outputs OA,OB∈{0,1}OA,OB∈{0,1}, and let VAVA and VBVB denote the parties' individual views. Proto...
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Linkable Ring Signature Payment Channel Blockchain
font style='font-size:12px;'>
2019/6/3
Monero has emerged as one of the leading cryptocurrencies with privacy by design. However, this comes at the price of reduced expressiveness and interoperability as well as severe scalability issues. ...
Subliminal channels in post-quantum digital signature schemes
Subliminal channels post-quantum digital signatures
font style='font-size:12px;'>
2019/5/29
We analyze the digital signatures schemes submitted to NIST's Post-Quantum Cryptography Standardization Project in search for subliminal channels.
Multi-Party Virtual State Channels
blockchain state channel network off-chain protocol
font style='font-size:12px;'>
2019/5/28
Smart contracts are self-executing agreements written in program code and are envisioned to be one of the main applications of blockchain technology. While they are supported by prominent cryptocurren...
On the Commitment Capacity of Unfair Noisy Channels
Commitment capacity unconditionally secure cryptography unfair noisy channels
font style='font-size:12px;'>
2019/5/28
Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exchanging secret-keys as well as realizing other cryptographic primitives such as commitment and oblivi...
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
blockchain distributed cryptography public-key cryptography
font style='font-size:12px;'>
2019/4/10
Blockchain technology has immense potential. At the same time, it is not always possible to scale blockchains. State Channels solve the problem of scalability while increasing the blockchain's speed a...
On the Difficulty of Hiding the Balance of Lightning Network Channels
Bitcoin Blockchain Network Security
font style='font-size:12px;'>
2019/4/1
The Lightning Network is a second layer technology running on top of Bitcoin and other Blockchains. It is composed of a peer-to-peer network, used to transfer raw information data. Some of the links i...
华南师范大学生命科学学院离子通道生物学课件 Cl channels I
华南师范大学生命科学学院 离子通道生物学 课件 Cl channels I
font style='font-size:12px;'>
2019/1/16
华南师范大学生命科学学院离子通道生物学课件 Cl channels I。
华南师范大学生命科学学院离子通道生物学课件 K channels
华南师范大学生命科学学院 离子通道生物学 课件 K channels
font style='font-size:12px;'>
2019/1/16
华南师范大学生命科学学院离子通道生物学课件 K channels。
华南师范大学生命科学学院离子通道生物学课件 Na channels
华南师范大学生命科学学院 离子通道生物学 课件 Na channels
font style='font-size:12px;'>
2019/1/16
华南师范大学生命科学学院离子通道生物学课件 Na channels。
华南师范大学生命科学学院离子通道生物学课件 Ca channels
华南师范大学生命科学学院 离子通道生物学 课件 Ca channels
font style='font-size:12px;'>
2019/1/16
华南师范大学生命科学学院离子通道生物学课件 Ca channels。
Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove
Secure Channels Ciphertext Fragmentation Universal Composability
font style='font-size:12px;'>
2018/11/16
Ever since the foundational work of Goldwasser and Micali, simulation has proven to be a powerful and versatile construct for formulating security in various areas of cryptography. However security de...