搜索结果: 1-15 共查到“secrets”相关记录84条 . 查询时间(0.203 秒)

Gravitational-wave detectors start next observing run to explore the secrets of the universe(图)
引力波探测器 引力波 宇宙观测
2023/6/9



Scientists have developed two complementary bladder models to study urinary tract infections (UTIs) caused by E. coli: bladder organoids and a bladder-on-a- chip. The two studies reveal how bacteria i...


Secrets to climate change adaptation uncovered in the European corn borer moth(图)
climate change adaptation European corn borer moth
2019/11/15
The ability to synchronize behavioral, morphological and other transitions with the seasons is integral to the life cycle of most insects. A research team led by biologists at Tufts University has fou...

The ice worm is one of the largest organisms to spend its life in ice, and Washington State University scientist Scott Hotaling is one of the only people on the planet studying it.He is the author of ...
Securely managing encrypted data on an untrusted party is a challenging problem that has motivated the study of a variety of cryptographic primitives. A special class of such primitives allows an untr...
Secret-Sharing from Robust Conditional Disclosure of Secrets
cryptographic protocols secret sharing
2019/5/21
A secret-sharing scheme is a method by which a dealer, holding a secret string, distributes shares to parties such that only authorized subsets of parties can reconstruct the secret. The collection of...
A time-release protocol enables one to send secrets into a future release time. The main technical challenge lies in incorporating timing control into the protocol, especially in the absence of a cent...
Placing Conditional Disclosure of Secrets in the Communication Complexity Universe
information theoretic cryptography communication complexity
2018/12/3
In the Conditional Disclosure of Secrets (CDS) problem (Gertner et al., J. Comput. Syst. Sci., 2000) Alice and Bob, who hold nn-bit inputs xx and yy respectively, wish to release a common secret zz to...
On the Hardness of Learning With Errors with Binary Secrets
complexity theory lattice based cryptography foundations
2018/11/5
We give a simple proof that the decisional Learning With Errors (LWE) problem with binary secrets (and an arbitrary polynomial number of samples) is at least as hard as the standard LWE problem (with ...
Recovering Secrets From Prefix-Dependent Leakage
Galton--Watson process discrete logarithm problem cryptanalysis
2018/9/6
We discuss how to recover a secret bitstring given partial information obtained during a computation over that string, assuming the computation is a deterministic algorithm processing the secret bits ...