搜索结果: 1-15 共查到“知识库 Compact”相关记录382条 . 查询时间(0.071 秒)
VITEK-2 Compact检测奇异变形杆菌、摩根摩根菌、铜绿假单胞菌的部分药敏结果准确性评价
VITEK-2 Compact K-B 法 奇异变形杆菌 摩根摩根菌 铜绿假单胞菌
2021/3/22
探讨 VITEK-2 Compact 检测奇异变形杆菌、摩根摩根菌和铜绿假单胞菌的部分药敏结果的准确性。方法收集 2017 年 3 月 ~2020 年 3 月临床分离的 58 株奇异变形杆菌、32 株摩根摩根菌和 280 株铜绿假单胞菌,以纸片扩散法(K-B 法)为参考方法,用 VITEK 2 Compact AST-GN16 药敏卡检测前两种菌对亚胺培南(IPN)的敏感度,用 AST-GN09药...
梅里埃MALDI-TOF-MS 系统与VITEK 2 Compact 全自动微生物鉴定仪对临床常见病原菌鉴定的一致性分析
病原菌鉴定 基质辅助激光解吸电离飞行时间质谱 VITEK2Compact
2021/3/17
分析梅里埃基质辅助激光解吸电离飞行时间质谱(matrix-assisted laser desorption ionization-time of flightmass spectrometry,MALDI-TOF-MS)系统与VITEK 2 Compact 全自动微生物鉴定仪对临床常见病原菌鉴定的一致性。方法 收集福建医科大学孟超肝胆医院2018 年6 月~ 2019 年3 月来自临床不同标本分...
Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies
Post-quantum cryptosystems Isogeny-based cryptosystems CSIDH
2019/9/17
ISO/IEC standardizes several chosen ciphertext-secure key encapsulation mechanism (KEM) schemes in ISO/IEC 18033-2. However, all ISO/IEC KEM schemes are not quantum resilient. In this paper, we introd...
Compact and Scalable Arbitrary-centered Discrete Gaussian Sampling over Integers
Lattice-based crypto discrete Gaussian sampling implementation
2019/9/16
The arbitrary-centered discrete Gaussian sampler is a fundamental subroutine in implementing lattice trapdoor sampling algorithms. However, existing approaches typically rely on either a fast implemen...
Randomly Rotate Qubits Compute and Reverse --- IT-Secure Non-Interactive Fully-Compact Homomorphic Quantum Computations over Classical Data Using Random Bases
Homomorphic encryption Quantum cryptography Information-theoretic security
2019/9/16
Homomorphic encryption (HE) schemes enable processing of encrypted data and may be used by a user to outsource storage and computations to an untrusted server. A plethora of HE schemes has been sugges...
Fast, Compact, and Expressive Attribute-Based Encryption
attribute-based encryption standard assumption non-monotone
2019/8/27
Attribute-based encryption (ABE) is an advanced cryptographic tool and useful to build various types of access control systems. Toward the goal of making ABE more practical, we propose key-policy (KP)...
We describe an efficient linkable ring signature scheme, compact linkable spontaneous anonymous group (CLSAG) signatures, for use in confidential transactions. Compared to the existing signature schem...
Exploring Constructions of Compact NIZKs from Various Assumptions
non-interactive zero-knowledge pairing homomorphic equivocal commitment
2019/6/4
A non-interactive zero-knowledge (NIZK) protocol allows a prover to non-interactively convince a verifier of the truth of the statement without leaking any other information. In this study, we explore...
An Efficient and Compact Reformulation of NIST Collision Estimate Test
IID Non-IID Min Entropy
2019/5/14
In this paper we give an efficient and compact reformulation of NIST collision estimate test given in SP-800 90B. We correct an error in the formulation of the test and show that the test statistic ca...
Compact Adaptively Secure ABE for NC1 from k-Lin
attribute-based encryption adaptive security bilinear maps
2019/2/28
We present compact attribute-based encryption (ABE) schemes for NC1 that are adaptively secure under the k-Lin assumption with polynomial security loss. Our KP-ABE scheme achieves ciphertext size that...
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers
Lattice-based crypto Discrete Gaussian sampling Constant-time
2019/1/2
The discrete Gaussian sampler is one of the fundamental tools in implementing lattice-based cryptosystems. However, a naive discrete Gaussian sampling implementation suffers from side-channel vulnerab...
SeaSign: Compact isogeny signatures from class group actions
post-quantum crypto isogenies
2018/11/19
We give a new signature scheme for isogenies that combines the class group actions of CSIDH with the notion of Fiat-Shamir with aborts. Our techniques allow to have signatures of size less than one ki...
TACHYON: Fast Signatures from Compact Knapsack
Digital signatures post-quantum security authentication
2018/11/13
We introduce a simple, yet efficient digital signature scheme which offers post-quantum security promise. Our scheme, named TACHYONTACHYON, is based on a novel approach for extending one-time hash-bas...
A Sparse Merkle tree is based on the idea of a complete Merkle tree of an intractable size. The assumption here is that as the size of the tree is intractable, there would only be a few leaf nodes wit...
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Lattice cryptography Post-quantum cryptography Learning with rounding
2018/8/10
Standardization bodies such as NIST and ETSI are currently seeking quantum resistant alternatives to vulnerable RSA and elliptic curve-based public-key algorithms. In this context, we present Round5, ...