搜索结果: 1-15 共查到“知识库 reduction”相关记录727条 . 查询时间(0.093 秒)
Identification and Functional Analysis of Two Alcohol Dehydrogenase Genes Involved in Catalyzing the Reduction of (Z)‑3-Hexenal into (Z)‑3-Hexenol in Tea Plants (Camellia sinensis)
乙醇脱氢酶 ADH AsODNs Camellia sinensis
2023/4/19
Alcohol dehydrogenase (ADH) is a vital enzyme in the biosynthesis pathway of six-carbon volatiles in plants. However, little is known about its functions in tea plants. Here, we identified two ADH gen...
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos
Kerberos authenticated key exchange
2019/7/10
Kerberos is one of the earliest network security protocols, providing authentication between clients and servers with the assistance of trusted servers. It remains widely used, notably as the default ...
The General Sieve Kernel and New Records in Lattice Reduction
cryptanalysis lattice reduction sieving
2019/1/29
We propose the General Sieve Kernel (G6K, pronounced /ʒe.si.ka/), an abstract stateful machine supporting a wide variety of lattice reduction strategies based on sieving algorithms. Using the bas...
LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS
LWE problem lattice-based cryptography side-channel analysis
2018/11/19
Our interest in studying this problem stems from the side-channel attack against the BLISS lattice-based signature scheme described by Espitau et al. at CCS 2017. The attack targets a quadratic functi...
ON VOLUME DATA REDUCTION FOR LIDAR DATASETS
LiDAR Redundancy Q-tree Big Data Problem Topography DTM
2018/11/9
This paper discusses a current issue for several experimental science disciplines, which is the Big Data Problem (BDP). This research study focused on light intensity and ranging (LiDAR) datasets, whi...
OPTIMAL INFORMATION EXTRACTION OF LASER SCANNING DATASET BY SCALE-ADAPTIVE REDUCTION
Multi-scale Surface variation Radial basis function Just-Noticeable-Difference Degradation
2018/5/16
3D laser technology is widely used to collocate the surface information of object. For various applications, we need to extract a good perceptual quality point cloud from the scanned points. To solve ...
State-Separating Proofs: A Reduction Methodology for Real-World Protocols
composition verification key exchange
2018/4/4
The security analysis of real-world protocols involves reduction steps that are conceptually simple but have to handle complicated protocol details. Taking inspiration from Universal Composability, Ab...
“DISASTER RESILIENT SOCIETY WITH YOUTH” PROJECT OF THE CIVIL DEFENCE ORGANIZATION AIMING DISASTER RISKS REDUCTION
Disaster Resilience Risks Reduction Voluntarism Youth
2018/4/18
The loss of lives, injuries and the damage on economies that occur as a result of disasters is increasing due to the changing nature. People need to adopt themselves to be able to resist against disas...
FLOOD VULNERABILITY REDUCTION, USING A PARTIAL PARTICIPATORY GIS APPROACH. A STUDY CASE IN BAJA CALIFORNIA SUR, MEXICO
Participatory cartography loods cyclones vulnerability reduction
2018/4/18
A partial participatory GIS approach was implemented in a community in La Paz, Baja California Sur, Mexico to reduce vulnerability of floods caused by cyclones. A workshop was held to locate areas sus...
“DISASTER RESILIENT SOCIETY WITH YOUTH” PROJECT OF THE CIVIL DEFENCE ORGANIZATION AIMING DISASTER RISKS REDUCTION
Disaster Resilience Risks Reduction Voluntarism Youth
2018/5/8
The loss of lives, injuries and the damage on economies that occur as a result of disasters is increasing due to the changing nature. People need to adopt themselves to be able to resist against disas...
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage
whitebox cryptanalysis security evaluation
2018/1/29
Differential computation analysis (DCA) is a technique recently introduced by Bos et al. and Sanfelix et al. for key recovery from whitebox implementations of symmetric ciphers. It consists in applyin...
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks
SMR BA
2018/1/17
The recent advent of blockchains has spurred a huge interest in the research and development of numerous cryptocurrencies as well as understanding the fundamental concepts that underly this technology...
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem
lattice basis reduction massive parallelization shortest vector problem
2018/1/11
The hardness of the shortest vector problem for lattices is a fundamental assumption underpinning the security of many lattice-based cryptosystems, and therefore, it is important to evaluate its diffi...
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
digital signatures the CDH assumption trapdoor commitments
2017/11/22
We present a signature scheme with the tightest security-reduction among known constant-size signature schemes secure under the computational Diffie-Hellman (CDH) assumption. It is important to reduce...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
AES Side Channel Attacks
2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...