搜索结果: 1-15 共查到“Primitive”相关记录74条 . 查询时间(0.078 秒)
Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages
Authenticated encryption new primitive forkcipher
font style='font-size:12px;'>
2019/9/6
Highly efficient encryption and authentication of short messages is an essential requirement for enabling security in constrained scenarios such as the CAN FD in automotive systems (max. message size ...
On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2)
implementation multiplication modular reduction
font style='font-size:12px;'>
2017/9/18
In this paper we present a number of algorithms and optimization techniques to speedup computations in binary extension fields over GF(2). Particularly, we consider multiplication and modular reductio...
Proposal of primitive polynomials for Linux kernel PRNG
LFSRs PRNG
font style='font-size:12px;'>
2017/8/1
The polynomials defining the LFSRs of the linux Kernel PRNG are irreducible but not primitive. As a result, the space of numbers generated by these LFSRs does not fill all the space. We propose in thi...
Primitive Ontology and the Structure of Fundamental Physical Theories
Quantum theories primitive ontology wave function ontology symmetry properties
font style='font-size:12px;'>
2016/5/27
For a long time, it was believed that it was impossible to be realist about quantum mechanics. It took quite a while for the researchers in the foundations of physics, beginning with John Stuart Bell ...
Predictions and Primitive Ontology in Quantum Foundations:A Study of Examples
quantum theory without observers Ghirardi–Rimini–Weber (GRW) theory of spontaneous wave function collapse Bohmian mechanics many-worlds view of quantum mechanics
font style='font-size:12px;'>
2016/5/27
A major disagreement between different views about the foundations of quantum mechanics concerns whether for a theory to be intelligible as a fundamental physical theory it must involve a “primitive o...
Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience
Bilinear Pairing Certificateless cryptography Key insulated
font style='font-size:12px;'>
2016/5/24
Certificateless encryption (CLE) alleviates the heavy certificate management in traditional public key encryption and the key escrow problem in the ID-based encryption simultaneously. Current CLE sche...
The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials
feedback shift register adjacency graph De Bruijn sequence
font style='font-size:12px;'>
2016/3/11
We consider the adjacency graphs of the linear feedback shift registers (LFSRs) with characteristic polynomials of the form l(x)p(x), where l(x) is a polynomial of small degree and p(x) is a primitive...
PERCEPTUALLY GUIDED GEOMETRICAL PRIMITIVE LOCATION METHOD FOR 3D COMPLEX BUILDING SIMPLIFICATION
3D complex building Geometrical primitive location Human vision system
font style='font-size:12px;'>
2016/2/29
Because of detailed geometrical components based description, 3D complex building contains the most elaborated perceptual and
comprehensive semantic information. However, since the lack of optimal si...
Remarks on the Cryptographic Primitive of Attribute-based Encryption
Attribute-based encryption one-to-one encryption one-to-many encryption
font style='font-size:12px;'>
2016/1/7
Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based
on user attributes is a type of one-to-many encryption. Unlike the conventional one-to-one encryption
which ...
GENERALISATION OF 3D BUILDING MODELS BY CELL DECOMPOSITION AND PRIMITIVE INSTANCING
Generalization Algorithms Building Three-dimensional GIS Visualization
font style='font-size:12px;'>
2015/9/28
The article presents a cartographic generalisation approach for 3D building models with regard to the thematic visualisation of urban
landscapes. Based on our earlier work to utilise approximating p...
福建农林大学计算机与信息学院JAVA语言程序设计课件Chapter2 Primitive Data Types and Operations
福建农林大学计算机与信息学院 JAVA语言程序设计 课件 Chapter2 Primitive Data Types and Operations
font style='font-size:12px;'>
2015/9/21
福建农林大学计算机与信息学院JAVA语言程序设计课件Chapter2 Primitive Data Types and Operations。
AUTOMATED DTM GENERATION FOR LOW TEXTURED IMAGES USING MULTIPLE PRIMITIVE MULTI-IMAGE MATCHING (MPM)
Accuracy Archaeology Adjustment
font style='font-size:12px;'>
2015/8/28
In the frame of our long term, interdisciplinary Nasca/Palpa project, conducted in a close cooperation between our group and
archaeologists from the German Archaeological Institute (DAI, KAAK Bonn), ...
Unertan Syndrome Quadrupedality,Primitive Language, and Severe Mental Retardation A New Theory on the Evolution of Human Mind
evolution quadrupedality mind motor system extensor muscle human
font style='font-size:12px;'>
2015/8/5
The recently discovered “UNERTAN SYNDROME” consists of quadrupedal gait, severe mental retardation, and primitive language. This syndrome can be considered as devolution of human being, throwing a lig...
Automatic modelling of building façade objects via primitive shapes
Detection Mobile Laser Scanners Point clouds Geometric Feature Urban Trees Principal direction
font style='font-size:12px;'>
2014/9/9
This paper presents a new approach to recognize individual façade objects and to reconstruct such objects in 3D using MLS point clouds. Core of the approach is a primitive shape based algorithm, ...
Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)
Light-weight block cipher structural attack
font style='font-size:12px;'>
2014/3/12
In [12], the authors present a new light-weight cryptographic primitive which supports an associated RFID-based authentication protocol. The primitive has some structural similarities to AES, but is p...