搜索结果: 1-15 共查到“Timing”相关记录244条 . 查询时间(0.119 秒)
Genomic analysis identifies variants that can predict the timing of menopause(图)
time prediction of menopause repair of DNA damage ANM DDR
2021/8/9
A broad analysis has identified genetic variants that influence age at natural menopause. The results implicate mechanisms such as DNA-damage repair and give insights into the potential for predicting...
A Practicable Timing Attack Against HQC and its Countermeasure
HQC BCH decoding Timing attack
2019/8/8
In this paper, we present a practicable chosen ciphertext timing attack retrieving the secret key of HQC. The attack exploits a correlation between the weight of the error to be decoded and the runnin...
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips
Lattice-Based Cryptography Cryptanalysis BLISS
2019/8/7
As one of the most efficient lattice-based signature schemes, and one of the only ones to have seen deployment beyond an academic setting (e.g., as part of the VPN software suite strongSwan), BLISS ha...
In the 1960s, University of Pennsylvania biologist Dan Janzen re-described what has become a classic example of biological mutualism: the relationship between acacia-ants and ant-acacia trees. The aca...
Perfect timing:Making the 'switch' from juvenile to adult(图)
Perfect timing Making switch juvenile adult
2019/10/23
Very little is known about how the onset of puberty is controlled in humans, but an NSF-funded discovery of a new gene in the roundworm C. elegans could be the "missing link" that determines the juven...
Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes
Post-Quantum Cryptography Decryption Failures Side-Channel Attacks
2019/3/20
While error correcting codes (ECC) have the potential to significantly reduce the failure probability of post-quantum schemes, they add an extra ECC decoding step to the algorithm. As this additional ...
Analysis of Secure Caches and Timing-Based Side-Channel Attacks
Secure Caches Side-Channel Attacks Security Analysis
2019/2/25
Many secure cache designs have been proposed in literature with the aim of mitigating different types of cache timing-based side-channel attacks. However, there has so far been no systematic analysis ...
中国地质大学科学技术发展院葛翔,沈传波等, 资源学院构造与油气资源教育部重点实验室 AAPG Bulletin, 2018, Petroleum generation timing and source in the Northern Longmen Shan Thrust Belt, Southwest China: Implications for multiple oil generation episodes and sources
四川盆地;周缘矿山梁;米仓山震旦;寒武
2021/10/21
2018年,国际石油地质重要期刊《AAPG Bulletin》刊发了两篇中国地质大学关于四川盆地周缘矿山梁和米仓山震旦-寒武古油藏形成和演化的研究成果。资源学院构造与油气资源教育部重点实验室博士葛翔为文章的第一作者,导师沈传波教授为通讯作者。
In this paper we provide a formal treatment of proof of replicated storage, a novel cryptographic primitive recently proposed in the context of a novel cryptocurrency, namely Filecoin.
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
secure processor cache timing attack cache partitioning
2018/5/11
Software side channel attacks have become a serious concern with the recent rash of attacks on speculative processor architectures. Most attacks that have been demonstrated exploit the cache tag state...
IMPROVEMENT ON TIMING ACCURACY OF LIDAR FOR REMOTE SENSING
Laser rangefinding Leading-edge timing discrimination Walk error MATLAB Lidar data quality
2018/5/17
The traditional timing discrimination technique for laser rangefinding in remote sensing, which is lower in measurement performance and also has a larger error, has been unable to meet the high precis...
Cache-Timing Attacks on RSA Key Generation
applied cryptography public key cryptography RSA
2018/4/25
During the last decade, constant-time cryptographic software has quickly transitioned from an academic construct to a concrete security requirement for real-world libraries. Most of OpenSSL's constant...
QC-MDPC: A Timing Attack and a CCA2 KEM
post-quantum cryptography code-based cryptography QC-MDPC codes
2018/3/12
In 2013, Misoczki, Tillich, Sendrier and Barreto proposed a variant of the McEliece cryptosystem based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes. This proposal uses an iterative bi...
Timing of Metamorphism and Provenance of the Metamorphic Basement of the Xiangshan Uranium Orefield, Jiangxi Province, China
basement metamorphic rock detrital zircon sedimentary provenance Precambrian Jiangnan orogenic belt Xiangshan
2018/4/10
The origin, age and evolution of the Precambrian metamorphic basement of southern China provide useful insights into early crustal development. Here, we present new laser ablation–inductively coupled ...
Later circadian timing of food intake is associated with increased body fat
metabolism sleep duration body composition caloric intake melatonin
2018/11/20
Background: Weight gain and obesity have reached alarming levels. Eating at a later clock hour is a newly described risk factor for adverse metabolic health; yet, how eating at a later circadian time ...