搜索结果: 1-15 共查到“知识库 adaptive”相关记录708条 . 查询时间(0.252 秒)
Revealing Distinctions in Genetic Diversity and Adaptive Evolution Between Two Varieties of Camellia sinensis by Whole-Genome Resequencing
Whole-Genome Resequencing Genetic Diversity Camellia sinensis
2023/4/20
Camellia sinensis var. sinensis (CSS) and C. sinensis var. assamica (CSA) are the two most economically important tea varieties. They have different characteristics and geographical distribution. Thei...
Adaptive innovation of green plants by horizontal gene transfer
Adaptive innovation green plant horizontal gene transfer
2023/7/20
Genetic contribution of paleopolyploidy to adaptive evolution in angiosperms
whole-genome duplication paleopolyploidy adaptive evolution phylogenomic Cretaceous-Paleocene boundary gene regulatory network
2024/2/5
Ancient whole-genome duplications (WGD or polyploidy) are prevalent in plants, and some WGDs occurred during the timing of severe global environmental changes. It has been suggested that WGDs may have...
A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting
SPN AES Exchange Attack
2019/8/20
In this paper, we study the results of the recently proposed exchange attack in an adaptive setting. As expected, it leads to present a better 6-round key-independent distinguisher in terms of data an...
In this note, we present a polynomial time and memory adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi...
Emergent Protective Organogenesis in Date Palms: A Morpho-devo-dynamic Adaptive Strategy During Early Development
Phoenix dactylifera L. emergent protective desert plants early organogenesis organ-specific cell
2024/3/4
Desert plants have developed mechanisms for adapting to hostile desert conditions, yet these mechanisms remain poorly understood. Here, we describe two unique modes used by desert date palms (Phoenix ...
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
Smooth Projective Hash Functions Oblivious Transfer
2019/6/19
Since the seminal result of Kilian, Oblivious Transfer has proven to be a fundamental primitive in cryptography. In such a scheme, a user is able to gain access to an element owned by a server, withou...
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System
public-key encryption leakage-resilience CCA security
2019/5/21
We propose the concept of quasi-adaptive hash proof system (QAHPS), where the projection key is allowed to depend on the specific language for which hash values are computed. We formalize leakage-resi...
UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions
Commitment Universal Composability Global Random Oracle
2019/5/21
We propose a generic framework for perfectly hiding UC-Commitment schemes in the Global Random Oracle model of Canetti \textit{el at.} (CCS 14). The main building block of our construction is a novel ...
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate
secret sharing non-malleability leakage resilience computational security
2019/2/27
We revisit the concept of *non-malleable* secret sharing (Goyal and Kumar, STOC 2018) in the computational setting. In particular, under the assumption of one-to-one one-way functions, we exhibit a *c...
Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding
public-key cryptography Full Attribute-hiding
2018/11/16
In this work, we propose two IPE schemes achieving both adaptive security and full attribute-hiding in the prime-order bilinear group, which improve upon the unique existing result satisfying both fea...
OPTIMIZED ORGANIZATION AND ADAPTIVE VISUALIZATION OF COMPLICATED MOUNTAIN DISASTER 3D SCENES FOR DIVERSE TERMINALS
Mountain Disaster 3D Scenes Adaptive Visualization
2018/11/9
Mountain disaster scenes usually contains various geographical entities, which are dynamic and complicated. Therefore, the construction of mountain disaster 3D scenes has great significance for disast...
We give a construction of an adaptive garbled RAM scheme. In the adaptive setting, a client first garbles a ``large'' persistent database which is stored on a server. Next, the client can provide mult...
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors
broadcast encryption private linear key agreement traitor tracing
2018/5/28
Private linear key agreement (PLKA) enables a group of users to agree upon a common session key in a broadcast encryption (BE) scenario, while traitor tracing (TT) system allows a tracer to identify c...
Non-adaptive Group-Testing Aggregate MAC Scheme
message authentication aggregate group testing
2018/5/22
This paper applies non-adaptive group testing to aggregate message authentication code (MAC) and introduces non-adaptive group-testing aggregate MAC. After formalization of its syntax and security req...