搜索结果: 1-15 共查到“Proof”相关记录319条 . 查询时间(0.061 秒)
![](http://www.firstlight.cn/upload/imgfile/20236/7/20236715618308.jpg)
Sweat-proof “smart skin” takes reliable vitals, even during workouts and spicy meals(图)
智能皮肤 传感器 可穿戴监视器
font style='font-size:12px;'>
2023/6/7
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A simpler proof of the Frank-Lieb inequality on the Heisenberg group
海森堡群 Frank-Lieb inequality 更简单证明
font style='font-size:12px;'>
2023/4/14
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Berndtsson’s proof of the Bourgain-Milman theorem
伯恩松 布尔根-米尔曼定理 证明
font style='font-size:12px;'>
2023/4/28
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A constructive proof of finite time blowup of 3D incompressible Euler equations with smooth data
光滑数据 三维不可压缩 欧拉方程 有限时间爆破 构造性证明
font style='font-size:12px;'>
2023/5/10
![](http://www.firstlight.cn/upload/imgfile/20236/7/20236715028408.jpg)
“Magic-angle” trilayer graphene may be a rare, magnet-proof superconductor(图)
三层石墨烯 防磁超导体 MRI机器 量子计算机
font style='font-size:12px;'>
2023/6/7
A Machine-Checked Proof of Security for AWS Key Management Service
Provable-Security Machine-Checked Proof Key Management
font style='font-size:12px;'>
2019/9/19
We present a machine-checked proof of security for the domain management protocol of Amazon Web Services' KMS (Key Management Service) a critical security service used throughout AWS and by AWS custom...
Halo: Recursive Proof Composition without a Trusted Setup
zero knowledge elliptic curve cryptosystem
font style='font-size:12px;'>
2019/9/16
Non-interactive proofs of knowledge allow us to publicly demonstrate the faithful execution of arbitrary computations. SNARKs have the additional property of succinctness, meaning that the proofs are ...
Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol
Puncturable Signatures PoS Blockchain
font style='font-size:12px;'>
2019/8/30
Proof-of-stake (PoS) blockchain protocols are emerging as one of the most promising alternative to the energy-consuming proof-of-work protocols. However, one particularly critical threat in the PoS se...
Noninteractive Zero Knowledge Proof System for NP from Ring LWE
zero knowledge MSIS
font style='font-size:12px;'>
2019/8/30
A hash function family is called correlation intractable if for all sparse relations, it hard to find, given a random function from the family, an input output pair that satisfies the relation. Correl...
Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake
Blockchain Consensus Clock Synchronization
font style='font-size:12px;'>
2019/7/22
Proof-of-stake (PoS) has been shown to be a suitable replacement—in many respects—for the expensive proof-of-work mechanism introduced by the Bitcoin protocol. Nevertheless, one common and seemingly i...
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Kerberos authenticated key exchange
font style='font-size:12px;'>
2019/7/10
Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default ...
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies
Cryptocurrencies blockchain smart contracts
font style='font-size:12px;'>
2019/7/4
The feasibility of bribing attacks on cryptocurrencies was first highlighted in 2016, with various new techniques and approaches having since been proposed. Recent reports of real world 51%51% attacks...
Revelio: A MimbleWimble Proof of Reserves Protocol
Cryptocurrency MimbleWimble Grin
font style='font-size:12px;'>
2019/6/12
We reveal Revelio, a new privacy-preserving proof of reserves protocol for Grin exchanges. By design, Revelio allows the detection of collusion between exchanges while hiding the identities of the out...
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations
threshold cryptography two-party ECDSA
font style='font-size:12px;'>
2019/5/21
ECDSA is a widely adopted digital signature standard. Unfortunately, efficient distributed variants of this primitive are notoriously hard to achieve and known solutions often require expensive zero k...
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
public-key encryption leakage-resilience CCA security
font style='font-size:12px;'>
2019/5/21
We propose the concept of quasi-adaptive hash proof system (QAHPS), where the projection key is allowed to depend on the specific language for which hash values are computed. We formalize leakage-resi...