نتایج جستجو برای: rsa neurons
تعداد نتایج: 174853 فیلتر نتایج به سال:
2 RSA 4 2.1 The RSA system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.2 Establishing secret communication using the RSA system . . . . . . . . . . . . . 4 2.3 Security of RSA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4 A very small example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.5 Factoring Record...
OBJECTIVE This study aimed to determine the express level of tumour necrosis factor α (TNF-α) in the decidual tissue and peripheral blood of patients with recurrent spontaneous abortion (RSA). MATERIAL AND METHODS Eighty RSA patients and 100 control women were recruited in this study. Enzyme-linked immunosorbent assay (ELISA) was applied to determine the expression level of TNF-α in periphera...
We describe an efficient combination of two variants of the RSA cryptosystem (MPrime and Rebalanced RSA) analyzed by Boneh and Shacham [Boneh and Shacham 2002]. For 2048-bit moduli, the resulting decryption process is about 8 times faster than that presented by Quisquater and Couvreur [Quisquater and Couvreur 1982] and about 27 times faster than the original cryptosystem. Resumo. Descrevemos um...
In a (t, n) proxy signature scheme, the original signer can delegate his/her signing capability to n proxy signers such that any t or more proxy singers can sign messages on behalf of the former, but t − 1 or less of them cannot do the same thing. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite commo...
In 1982, Quisquater and Couvreur proposed an RSA variant, called RSA-CRT, based on the Chinese Remainder Theorem to speed up RSA decryption. In 1990, Wiener suggested another RSA variant, called Rebalanced-RSA, which further speeds up RSA decryption by shifting decryption costs to encryption costs. However, this approach essentially maximizes the encryption time since the public exponent e is g...
Young and Yung devised various backdoors for RSA key generation. However, due to their backdoor constructing method, the two MSBs of the modulus n generated by their systems have di¤erent distribution than that generated by the normal RSA. Thus, someone may observe the abnormal distribution of n to detect the existence of backdoors. Recently, Crepéau and Slakmon further suggested four simple wa...
Rhizoctonia solani agglutinin, further referred to as RSA, is a lectin isolated from the plant pathogenic fungus Rhizoctonia solani. Previously, we reported a high entomotoxic activity of RSA towards the cotton leafworm Spodoptera littoralis. To better understand the mechanism of action of RSA, Drosophila melanogaster Schneider S2 cells were treated with different concentrations of the lectin a...
Cardiac vagal control, as measured by indices of respiratory sinus arrhythmia (RSA), has been investigated as a marker of impaired self-regulation in mental disorders, including depression. Past work in depressed samples has focused on deficits in resting RSA levels, with mixed results. This study tested the hypothesis that depression involves abnormal RSA fluctuation. RSA was measured in depre...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید