نتایج جستجو برای: precomputed table

تعداد نتایج: 118833  

Journal: :Iet Information Security 2022

Deoxys-BC is the internal tweakable block cipher of authenticated encryption (AE) Deoxys family, in which Deoxys-II primary choice for use case ‘Defence depth’ among portfolio CAESAR competition. Improvements related-tweakey rectangle attacks on round-reduced using known distinguishers focussed this study. Under new related-key attack framework proposed by Dong et al. EUROCRYPT 2022, we present...

2000
M. A. Shokrollahi L. Blum F. Cucker M. Shub S. Smale J. Heintz

Basic algorithms in real algebraic geometry and their complexity: from Sturm's theorem to the existential theory of reals. polar varieties, real equation solving, and data structures: The hypersurface case. A partial k-arboretum of graphs with bounded tree-width (tutorial). a theory of computation and complexity over the real numbers: NP-completeness, recursive functions and universal machines....

2008
Z. Quan H. S. Kim M. S. Ryou M. S. Kim C. H. Choi S. G. Choi

This paper introduces a scaled PRT system, by which the expense and time for development can be reduced and the field applicability can also be improved. Furthermore, due to the propulsion based on the in-track linear induction motor (LIM), the need to carry motors and controllers on each vehicle and to provide guideway power rails can be eliminated, and thus the economical efficiency can be im...

2012
Kjell Hausken Galina A. Schwartz

We present a model of N-player contracting with transaction costs and endogenous property rights. Ex ante agreed surplus sharing can be altered ex post, after irreversible investments in production (characterised by the generalised Cobb-Douglas production function). The actual surplus sharing is determined ex post, after each player has chosen a costly action to alter the surplus sharing in his...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید