搜索结果: 1-15 共查到“知识库 Noise”相关记录510条 . 查询时间(0.078 秒)
Ergonomic Impact of Multi-rotor Unmanned Aerial Vehicle Noise in Warehouse Environments
Unmanned Aerial Vehicle (UAV) Noise Human subject MANOVA
2023/12/21
Small multi-rotor unmanned aerial vehicles (UAVs) are poised to revolutionize commercial and logistics sectors through their versatility, maneuverability, and rapidly increasing sophistication and dec...
Homomorphic noise growth in practice: comparing BGV and FV
Fully Homomorphic Encryption Lattice Cryptography Public-Key Encryption
2019/5/21
The purpose of this paper is to provide a comprehensive analysis and side-by-side comparison of the noise growth behaviour in the BGV and FV somewhat homomorphic encryption schemes, both heuristically...
Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
channel establishment ACCE mutli-stage
2019/5/5
The Noise protocol framework is a suite of channel establishment protocols, of which each individual protocol ensures various security properties of the transmitted messages, but keeps specification, ...
nQUIC: Noise-Based QUIC Packet Protection
UDP QUIC SSL
2019/1/16
We present nQUIC, a variant of QUIC-TLS that uses the Noise protocol framework for its key exchange and basis of its packet protector with no semantic transport changes. nQUIC is designed for deployme...
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis
Side-channel analysis Convolutional Neural Networks Machine learning
2018/11/2
Profiled side-channel attacks based on deep learning, and more precisely Convolutional Neural Networks, is a paradigm showing significant potential. The results, although scarce for now, suggest that ...
Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols
formal verification noise protocol framework cryptographic protocols
2018/8/21
The Noise Protocol Framework, introduced recently, allows for the design and construction of secure channel protocols by describing them through a simple, restricted language from which complex key de...
CONSTRUCTION THEORY AND NOISE ANALYSIS METHOD OF GLOBAL CGCS2000 COORDINATE FRAME
CGCS2000 globalization coordinate time series Noise analysis construction of geocentric reference frame Geodetic datum
2018/5/14
The definition, renewal and maintenance of geodetic datum has been international hot issue. In recent years, many countries have been studying and implementing modernization and renewal of local geode...
Security proof for Quantum Key Recycling with noise
quantum cryptography quantum key recycling
2018/3/13
Quantum Key Recycling aims to re-use the keys employed in quantum encryption and quantum authentication schemes. We consider QKR protocols where classical information is embedded in qubit states. A pa...
Hearing and seeing meaning in noise: Alpha, beta and gamma oscillations predict gestural enhancement of degraded speech comprehension
degraded speech gesture magnetoencephalography multimodal integration oscillations, semantics
2018/3/5
During face-to-face communication, listeners integrate speech with gestures. The semantic information conveyed by iconic gestures (e.g., a drinking gesture) can aid speech comprehension in adverse lis...
Talkers produce more pronounced amplitude modulations when speaking in noise
The speaker voice to speak noise language understanding neural oscillator
2018/3/5
Speakers adjust their voice when talking in noise (known as Lombard speech), facilitating speech comprehension. Recent neurobiological models of speech perception emphasize the role of amplitude modul...
Learning Parity with Noise Implies Collision Resistant Hashing
Learning Parity with Noise Collision Resistant Hashing binary Shortest Vector Problem
2018/1/2
In addition to the feasibility established, we discuss also the practical relevance of the CRH functions constructed (from the hardness of LPN). Interestingly, the SHA-3 proposal Fast Syndrome Based (...
In this work, we abstract some key ingredients in previous key exchange protocols based on LWE and its variants, by introducing and formalizing the building tool, referred to as key consensus (KC) and...
Distributed Computing with Channel Noise
interactive communication information theoretic security
2017/7/26
A group of nn users want to run a distributed protocol ππ over a network where communication occurs via private point-to-point channels. Unfortunately, an adversary, who knows ππ, is able to malicious...
Noise Distributions in Homomorphic Ring-LWE
Ring Learning with Errors Subgaussian Random Variable Homomorphic Encryption
2017/7/24
We develop a statistical framework to analyse the Ring-LWE processes of A Toolkit for Ring-LWE Cryptography (Eurocrypt 2013) and similar processes. We consider the δδ-subgaussian random variables used...
Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions
Physically Unclonable Functions Boolean Analysis Noise Sensitivity
2017/6/9
Along with the evolution of Physically Unclonable Functions (PUFs) as a remedy for the shortcomings of conventional key storage and generation methods, numerous successful attacks against PUFs have be...