搜索结果: 1-15 共查到“Design And Analysis”相关记录27条 . 查询时间(0.093 秒)
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques
Block cipher linear cryptanalysis FPGA
font style='font-size:12px;'>
2019/1/9
Secure block cipher design is a complex discipline which combines mathematics, engineering, and computer science. In order to develop cryptographers who are grounded in all three disciplines, it is ne...
IUTAM Symposium on Mechanical design and analysis for AM technologies (AMT 2018)
IUTAM Seminar Mechanical design Analysis technology
font style='font-size:12px;'>
2017/12/13
IUTAM Symposium on Mechanical design and analysis for AM technologies (AMT 2018).
Notes on the design and analysis of SIMON and SPECK
secret-key cryptography block ciphers
font style='font-size:12px;'>
2017/6/9
We discuss the design rationale and analysis of the SIMON and SPECK lightweight block ciphers.
Simplifying Design and Analysis of Complex Predicate Encryption Schemes
predicate encryption attribute-based encryption bilinear maps
font style='font-size:12px;'>
2017/3/9
Wee (TCC'14) and Attrapadung (Eurocrypt'14) introduced predicate and pair encodings, respectively, as a simple way to construct and analyze attribute-based encryption schemes, or more generally predic...
Graph-theoretic design and analysis of key predistribution schemes
Key predistribution schemes network security combinatorial designs
font style='font-size:12px;'>
2016/1/9
Key predistribution schemes for resource-constrained networks are methods for allocating symmetric keys to devices
in such a way as to provide an efficient trade-off between key storage, connectivity...
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys
authentication code non-uniformly random key information-theoretic security
font style='font-size:12px;'>
2016/1/3
The authentication code (A-code) is the one of the most fundamental cryptographic protocols in information-theoretic cryptography, and it provides information-theoretic integrity or authenticity, i.e....
Optimizing Design and Analysis of Industrial Photogrammetric Network
Robotics Interior Elements Industrial Photogrammetric Network Design
font style='font-size:12px;'>
2015/12/14
Mainly task of optimizing design of Industrial Photogrammetric Network with Variant Interior Elements (IPNVIE) is to provide a
schema for a set of interior relatively problems in a photographic task....
Early Skywave Detection Network:Preliminary Design and Analysis
Skywave Detection Network
font style='font-size:12px;'>
2015/6/26
A skywave signal is one has propagated by reflecting off the ionosphere. These signals are common in low frequency (LF) broadcast. However, in Loran, these signals are nuisances since they interfere w...
Design And Analysis Of A Hub For A 50-Horsepower, Three Bladed Wind Energy Conversion System
Design And Analysis A 50-Horsepower Three Bladed Wind Energy Conversion System
font style='font-size:12px;'>
2014/11/4
Design And Analysis Of A Hub For A 50-Horsepower, Three Bladed Wind Energy Conversion System.
De-randomizing Shannon: The Design and Analysis of a Capacity-Achieving Rateless Code
De-randomizing Shannon Analysis of a Capacity-Achieving Rateless Code Information Theory
font style='font-size:12px;'>
2012/6/15
This paper presents an analysis of spinal codes, a class of rateless codes proposed recently. We prove that spinal codes achieve Shannon capacity for the binary symmetric channel (BSC) and the additiv...
Comparison of Design and Analysis of Concrete Gravity Dam
Comparison Concrete Gravity Dam Dam Failure Design Earthquake Intensity Perturbation Stability and Stress
font style='font-size:12px;'>
2013/3/8
Gravity dams are solid concrete structures that maintain their stability against design loads from the geometric shape, mass and strength of the concrete. The purposes of dam construction may include ...
Accountability of Centralized Payment Systems: Formal Reasoning, Protocol Design and Analysis
Accountability Electronic payment Formal method Key generation and distribution Payment protocols
font style='font-size:12px;'>
2011/9/26
Accountability is one of the most critical security properties of electronic payment protocols. It can be used to resolve disputes among involved parties. Several formal logics were proposed for reaso...
Accountability of Centralized Payment Systems: Formal Reasoning, Protocol Design and Analysis
Accountability Electronic payment Formal method Key generation and distribution Payment protocols
font style='font-size:12px;'>
2011/9/26
Accountability is one of the most critical security properties of electronic payment protocols. It can be used to resolve disputes among involved parties. Several formal logics were proposed for reaso...
Design and Analysis of a Mechanical Device to Harvest Energy From Human Footstep Motion
energy harvesting dual-oscillating mechanism human motion
font style='font-size:12px;'>
2011/8/5
Portable electronics is usually powered by battery, which is not sustainable not only to the longtime outdoor use but also to our living environment.
Design and Analysis of Gecko-like Robot
geckolike structure design gait planning groundtowall
font style='font-size:12px;'>
2011/8/4
Geckolike robot (Geckobot), an important branch of bionic robotics, is a robot that simulates gecko’s capacity to climb walls and ceilings. The work environment of the traditional wallclimbing robot i...