Mathematics

[5306] A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)

Jintai Ding University of Cincinnati Chi Cheng China University of Geosciences Yue Qin China University of Geosciences

TBD mathscidoc:2207.43127

IACR Cryptol. ePrint Arch., 2019.3
[ Download ] [ 2022-07-22 17:32:45 uploaded by dingjt ] [ 1111 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[5307] A Hypothesis Testing Method Based on Sample and Two Types of Errors

Yuepeng Yang Shenzhen Middle School

S.-T. Yau High School Science Awarded Papers mathscidoc:1608.35131

[ Download ] [ 2016-08-13 21:51:59 uploaded by yauawardadmin ] [ 1110 downloads ] [ 0 comments ] [ Abstract ] [ Full ]
Please log in for comment!
 

[5308] Approximating the longest paths in grid graphs

Wen-Qi Zhang Tsinghua University Yong-Jin Liu Tsinghua University

Computational Geometry mathscidoc:1608.09010

Theoretical Computer Science, 412, (39), 5340, 2011.9
[ Download ] [ 2016-08-19 15:25:45 uploaded by liuyj ] [ 1110 downloads ] [ 0 comments ] [ Cited by 12 ] [ Abstract ] [ Full ]
Please log in for comment!
 

[5309] Mesure harmonique et équation de la chaleur

Yanick Heurteaux CNRS URA D0757, Université de Paris-Sud Mathématiques

TBD mathscidoc:1701.332851

Arkiv for Matematik, 34, (1), 119-139, 1994.8
[ Download ] [ 2017-01-08 20:35:47 uploaded by arkivadmin ] [ 1110 downloads ] [ 0 comments ] [ Cited by 2 ] [ Abstract ] [ Full ]
Please log in for comment!
 

[5310] A long ℂ^{2}which is not Stein

Erlend Fornæss Wold Department of Mathematics, University of Oslo

TBD mathscidoc:1701.333160

Arkiv for Matematik, 48, (1), 207-210, 2007.11
[ Download ] [ 2017-01-08 20:36:26 uploaded by arkivadmin ] [ 1110 downloads ] [ 0 comments ] [ Cited by 2 ] [ Abstract ] [ Full ]
Please log in for comment!
 

Show all 3 5 10 25 papers per page.
Sort by time views
 
Contact us: office-iccm@tsinghua.edu.cn | Copyright Reserved