>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到知识库 U-functions相关记录1652条 . 查询时间(0.14 秒)
It has been widely reported that biodiversity, ecosystems, and functional traits are positively interrelated in natural?forest?ecosystems. However, it remains unclear whether these relationships shoul...
In rural China, marriage-squeezed men are more likely to experience discrimination than other males. Using data collected from Anhui Province in China on marriage-squeezed men’s quality of life, this ...
生长素在植物的正常生长发育中起着至关重要的作用。TAA/YUCCA基因家族编码色氨酸氨基转移酶(tryptophan aminotransferase),是生长素合成的关键酶。然而,棉花中YUCCA(YUC)基因家族尚未见报道。为了揭示YUC基因在棉花中的功能,我们系统地鉴定了五个棉种中的YUC基因家族,包括成员分析、特征描述、基因组内复制和共线关系。转录组学分析表明,GhYUCs参与了棉花的非生...
Although the advantages of multi-species plantations over single-species plantations have been widely recognized, the mechanisms driving these advantages remain unclear. In this study, we compared sta...
Substantial work on trapdoor functions (TDFs) has led to many powerful notions and applications. However, despite tremendous work and progress, all known constructions have prohibitively large public ...
The goal of this paper is to investigate the behavior of the ideal cipher under linear cryptanalysis. The motivation of this work is twofold. First, before a practical cipher can be distinguished from...
Counting the Boolean functions having specific cryptographic features is an interesting problem in combinatorics and cryptography. Count of bent functions for more than eight variables is unexplored. ...
Boolean functions, and bent functions in particular, are considered up to so-called EA-equivalence, which is the most general known equivalence relation preserving bentness of functions. However, for ...
We study a question whether the currently known families of quadratic APN polynomials are pairwise different up to CCZ-equivalence. We reduce the list of these families to those CCZ-inequivalent to ea...
The two-terminal key agreement problem with biometric or physical identifiers is considered. Two linear code constructions based on Wyner-Ziv coding are developed. The first construction uses random l...
The complexity of collision-resistant hash functions has been long studied in the theory of cryptography. While we often think about them as a Minicrypt primitive, black-box separations demonstrate th...
Boneh, Bonneau, B{\"u}nz, and Fisch (CRYPTO 2018) recently introduced the notion of a \emph{verifiable delay function} (VDF). VDFs are functions that take a long \emph{sequential} time TT to compute, ...
A Verifiable Delay Function (VDF) is a function that takes at least TT sequential steps to evaluate and produces a unique output that can be verified efficiently, in time essentially independent of TT...
We introduce the notion of a continuous verifiable delay functioncontinuous verifiable delay function (cVDF): a function gg which is (a) iteratively sequential---meaning that evaluating the iteration ...
The study of non-linearity (linearity) of Boolean function was initiated by Rothaus in 1976. The classical non-linearity of a Boolean function is the minimum Hamming distance of its truth table to tha...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...