搜索结果: 1-15 共查到“知识库 Rate”相关记录1241条 . 查询时间(0.126 秒)
Sustainable rosin acid ester as internal electron donors in Ziegler-Natta catalysts for synthesis of isotactic polypropylene with high melt flow rate
Bio-derived rosin acid esters internal electron donors Ziegler-Natta catalyst polypropylene polymerization
font style='font-size:12px;'>
2023/12/11
In this contribution, novel bio-derived rosin acid ester compounds have been developed and used as internal electron donors to prepare MgCl2?supported titanium catalysts for propylene polymerization. ...
Ecosystem Carbon Stocks and Their Annual Sequestration Rate in Mature Forest Stands on the Mineral Soils of Estonia
forest ecosystem phytocoenosis soil cover organic carbon stock phytomass annual increase
font style='font-size:12px;'>
2023/12/4
Mature forest ecosystems are the most considerable reservoir of organic carbon (OC) among terrestrial ecosystems. The effect of soil type on aboveground OC stocks and their annual increases (AI) of ov...
Mechanical properties of carbon nanotubes/epoxy nanocomposites: Pre-curing, curing temperature, and cooling rate
Carbon nanotubes curing epoxy mechanical properties nanocomposites polymer nanocomposites
font style='font-size:12px;'>
2023/11/30
The effects of composite fabrication, such as pre-curing, curing temperature, and cooling rate, were studied. In this work, the pre-curing was defined as heat treatment of Multi-Walled Carbon Nanotube...
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More
Trapdoor functions range trapdoor hash power DDH
font style='font-size:12px;'>
2019/9/3
Substantial work on trapdoor functions (TDFs) has led to many powerful notions and applications. However, despite tremendous work and progress, all known constructions have prohibitively large public ...
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles
Fully-Homomorphic Encryption High-Rate Time-Lock Puzzles
font style='font-size:12px;'>
2019/6/19
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-homomorphic encryption schemes to obtain constructions with new properties. Specifically, we present ...
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
secret sharing non-malleability leakage resilience computational security
font style='font-size:12px;'>
2019/2/27
We revisit the concept of *non-malleable* secret sharing (Goyal and Kumar, STOC 2018) in the computational setting. In particular, under the assumption of one-to-one one-way functions, we exhibit a *c...
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
non-malleable codes tamper-proof security
font style='font-size:12px;'>
2019/1/26
For the case of split-state tampering, we establish the existence of rate-one continuously non-malleable codes with computational security, in the (non-programmable) random oracle model. We further ex...
On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders
code-based cryptography MDPC codes iterative decoding
font style='font-size:12px;'>
2018/12/20
Quasi-cyclic moderate density parity check codes allow the design of McEliece-like public-key encryption schemes with compact keys and a security that provably reduces to hard decoding problems for qu...
A remark on a success rate model fpr DPA and CPA
Side-channel attacks evaluation metric success rate
font style='font-size:12px;'>
2018/11/16
The success rate is the most common evaluation metric for measuring the performance of a particular side channel attack scenario. We improve on an analytic formula for the success rate.
Embedding Multiplications at a Linear Rate and its Applications
algebraic function fields Embedding Multiplications
font style='font-size:12px;'>
2018/5/2
Although the study of this embedding problem is of independent theoretical interest, we present a few representative applications to secure computation. We construct a linear number of oblivious trans...
IMPROVEMENT OF FOREST FIRE DETECTION ALGORITHM USING BRIGHTNESS TEMPERATURE LAPSE RATE CORRECTION IN HIMAWARI-8 IR CHANNELS: APPLICATION TO THE 6 MAY 2017 SAMCHEOK CITY, KOREA
Forest Fire Himawari-8 Brightness Temperature Lapse Rate Height Correction
font style='font-size:12px;'>
2018/5/15
Forest fires are a major natural disaster that destroys a forest area and a natural environment. In order to minimize the damage caused by the forest fire, it is necessary to know the location and the...
ESTIMATING HOUSING VACANCY RATE IN QINGDAO CITY WITH NPP-VIIRS NIGHTTIME LIGHT AND GEOGRAPHICAL NATIONAL CONDITIONS MONITORING DATA
Housing vacancy rate (HVR) NPP-VIIRS Nighttime light data Geographic National Conditions Monitoring Data (GNCMD) resident population distribution data SVM Moran's I
font style='font-size:12px;'>
2018/5/15
Accompanying China's rapid urbanization in recent decades, especially in the new millennium, the housing problem has become one of the most important issues. The estimation and analysis of housing vac...
Conditional Disclosure of Secrets and d-Uniform Secret Sharing with Constant Information Rate
secret sharing information-theoretic cryptography
font style='font-size:12px;'>
2018/1/12
Our main result applies to exponentially long secrets, and so it should be mainly viewed as a barrier against amortizable lower-bound techniques. We also show that in some natural simple cases (e.g., ...
Information-Theoretic Secret-Key Agreement: The Secret-Key Rate as a Function of the Channel Quality Ratio
Secret-Key Agreement Information-theoretic security Satellite model
font style='font-size:12px;'>
2017/11/28
Information theoretically secure secret-key exchange between two parties, Alice and Bob, is a well-studied problem that is provably impossible without additional assumptions. However, it has shown to ...
Decoding Linear Codes with High Error Rate and its Impact for LPN Security
Decoding binary linear codes BJMM Nearest Neighbors
font style='font-size:12px;'>
2017/11/28
Technically, our improvement comes from the heavy use of Nearest Neighbor techniques in all steps of the construction, whereas the BJMM-algorithm can only take advantage of Nearest Neighbor search in ...