>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 Compact相关记录382条 . 查询时间(0.071 秒)
探讨 VITEK-2 Compact 检测奇异变形杆菌、摩根摩根菌和铜绿假单胞菌的部分药敏结果的准确性。方法收集 2017 年 3 月 ~2020 年 3 月临床分离的 58 株奇异变形杆菌、32 株摩根摩根菌和 280 株铜绿假单胞菌,以纸片扩散法(K-B 法)为参考方法,用 VITEK 2 Compact AST-GN16 药敏卡检测前两种菌对亚胺培南(IPN)的敏感度,用 AST-GN09药...
分析梅里埃基质辅助激光解吸电离飞行时间质谱(matrix-assisted laser desorption ionization-time of flightmass spectrometry,MALDI-TOF-MS)系统与VITEK 2 Compact 全自动微生物鉴定仪对临床常见病原菌鉴定的一致性。方法 收集福建医科大学孟超肝胆医院2018 年6 月~ 2019 年3 月来自临床不同标本分...
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
The arbitrary-centered discrete Gaussian sampler is a fundamental subroutine in implementing lattice trapdoor sampling algorithms. However, existing approaches typically rely on either a fast implemen...
Homomorphic encryption (HE) schemes enable processing of encrypted data and may be used by a user to outsource storage and computations to an untrusted server. A plethora of HE schemes has been sugges...
Attribute-based encryption (ABE) is an advanced cryptographic tool and useful to build various types of access control systems. Toward the goal of making ABE more practical, we propose key-policy (KP)...
We describe an efficient linkable ring signature scheme, compact linkable spontaneous anonymous group (CLSAG) signatures, for use in confidential transactions. Compared to the existing signature schem...
A non-interactive zero-knowledge (NIZK) protocol allows a prover to non-interactively convince a verifier of the truth of the statement without leaking any other information. In this study, we explore...
In this paper we give an efficient and compact reformulation of NIST collision estimate test given in SP-800 90B. We correct an error in the formulation of the test and show that the test statistic ca...
We present compact attribute-based encryption (ABE) schemes for NC1 that are adaptively secure under the k-Lin assumption with polynomial security loss. Our KP-ABE scheme achieves ciphertext size that...
The discrete Gaussian sampler is one of the fundamental tools in implementing lattice-based cryptosystems. However, a naive discrete Gaussian sampling implementation suffers from side-channel vulnerab...
We give a new signature scheme for isogenies that combines the class group actions of CSIDH with the notion of Fiat-Shamir with aborts. Our techniques allow to have signatures of size less than one ki...
We introduce a simple, yet efficient digital signature scheme which offers post-quantum security promise. Our scheme, named TACHYONTACHYON, is based on a novel approach for extending one-time hash-bas...
Compact Sparse Merkle Trees     zero knowledge  hash functions       2018/11/6
A Sparse Merkle tree is based on the idea of a complete Merkle tree of an intractable size. The assumption here is that as the size of the tree is intractable, there would only be a few leaf nodes wit...
Standardization bodies such as NIST and ETSI are currently seeking quantum resistant alternatives to vulnerable RSA and elliptic curve-based public-key algorithms. In this context, we present Round5, ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...