搜索结果: 1-15 共查到“Weak”相关记录363条 . 查询时间(0.1 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:C1,1/3- very weak solutions to the two dimensional Monge–Ampère equation
二维 Monge–Ampère方程 C1,1/3极弱解
2023/11/29
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Weak values as statistical estimation
统计估计 弱值 量子可观测值 最小方差
2023/11/15
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Convex integration and non-uniqueness of weak solutions for viscous fluids
粘性流体弱解 凸积分 非唯一性
2023/4/23
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Energy Concentration and Weak Stability in Fluid Dynamics
流体动力学 能量集中 弱稳定性
2023/4/14
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Many-body localization and quantum many-body scars: The strong and weak form of ergodicity breaking
多体定位 量子多体疤痕 遍历性断裂 强弱形式
2023/4/23
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Weak multisymplectic spectral integrators with a resolution of Gibbs phenomenon
吉布斯现象 分辨率 弱多辛谱 积分器
2023/4/28
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Prediction When Factors are Weak
因素较弱 预测 宏观经济预测
2023/5/5
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Peakon Models II: Weak-kink, interactions with peakon, and Remedies
Peakon模型 弱扭结 相互作用 补救措施
2023/5/8

Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed
weak keys authenticated encryption comet
2019/8/6
In this article, we analyze two of the NIST Round 1 Candidates for the Lightweight Cryptography Standardization Process: COMET and mixFeed. We show how AEAD modes that are based on rekeying can be mod...
Invariant subspaces (Crypto'11) and subspace trails (FSE'17) are two related recent cryptanalytic approaches that led to new results on, e. g. PRINTCipher and AES. We extend the invariant subspace app...
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
PFG iO
2019/6/4
The existence of secure indistinguishability obfuscators (iO) has far-reaching implications, significantly expanding the scope of problems amenable to cryptographic study. All known approaches to cons...
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Hidden number problem ECDSA Lattices
2019/1/10
In this paper, we compute hundreds of Bitcoin private keys and dozens of Ethereum, Ripple, SSH, and HTTPS private keys by carrying out cryptanalytic attacks against digital signatures contained in pub...