>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到C-algebra相关记录270条 . 查询时间(0.109 秒)
In these two talks, some results on derived representation type via topological and homological methods will be introduced: (1) Two geometric models for graded skew-gentle algebras will be introduced ...
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also code-b...
Cramer and Damgård were the first to propose a constant-rounds protocol for securely solving a linear system of unknown rank over a finite field in multiparty computation (MPC). For mm linear equ...
We show how to build a binary matrix from the MRHS representation of a symmetric-key cipher. The matrix contains the cipher represented as an equation system and can be used to assess a cipher's resis...
The program opens with four days of tutorials that will provide an introduction to major themes of the entire program and the four workshops.The goal is to build a foundation for the participants of t...
This four-day workshop is devoted to discuss advanced topics from commutative algebra and Banach space theory. The theme of this workshop is twofold: parallel series of lectures will be delivered in c...
Linear algebra is an important area of mathematics and it is at the heart of many scientific, engineering, and industrial applications. Research and development in linear algebra include theoretical s...
日前,由中国期刊协会、中国科学技术期刊编辑学会、中国高校科技期刊研究会、全国高等学校文科学报研究会、《中国学术期刊(光盘版)》电子杂志社有限责任公司5家单位联合主办,同方知网承办的“2017中国学术期刊未来论坛”在北京会议中心隆重举行。此次会议中,中国学术期刊(光盘版)电子杂志社有限责任公司和清华大学图书馆联合发布了《2017中国学术期刊国际引证年报》,公布了备受学术界关注的2017年度“中国最具...
Fields Medal is considered as the Nobel Prize in Mathematics. We are pleased to announce that Fields Medalist Prof. E. Zelmanov is delivering Plenary Lecture in the conference.The purpose of the confe...
The security of several post-quantum cryptosystems is based on the assumption that solving a system of multivariate (quadratic) polynomial equations p1=⋯=pm=0p1=⋯=pm=0 over a finite field ...
The proportion of students taking a first algebra course in middle school has doubled over the past generation and there have been calls to make eighth grade algebra universal. We use significant poli...
Brakerski showed that linearly decryptable fully homomorphic encryption (FHE) schemes cannot be secure in the chosen plaintext attack (CPA) model. In this paper, we show that linearly decryptable FH...
The focus of this paper is a systematic study of differential privacy on streaming data using sketchbased algorithms. Previous works, like Dwork et al. (ICS 2010, STOC 2010), explored random sampling...
In this paper we consider a two party key-exchange protocol proposed in [4, Section 2] which uses tropical matrix algebra as a platform. Our analysis shows that the scheme is not secure.
In this article, we propose a method to perform linear algebra on a matrix with nearly sparse properties. More precisely, although we require the main part of the matrix to be sparse, we allow some ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...