نتایج جستجو برای: truncated

تعداد نتایج: 32383  

Journal: :Manuscripta Mathematica 2010

Journal: :Integral Equations and Operator Theory 2008

Journal: :Linear Algebra and its Applications 1978

Journal: :Methodology and Computing in Applied Probability 2012

Journal: :Journal of Pure and Applied Algebra 2012

Journal: :Physical review 2022

The Keldysh formalism for nonequilibrium Green's functions is a powerful theoretical framework the description of electronic structure, spectroscopy, and dynamics strongly correlated systems. However, underlying Kadanoff-Baym equations (KBE) two-time involve memory kernel which results in high computational cost long simulation times $t_\text{max}$, with cubic scaling computation time $t_\text{...

Journal: :IACR Cryptology ePrint Archive 2017
Maria Eichlseder Daniel Kales

The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implications of this approach for differential cryptanalysis and other attacks that can take advantage of related tweakeys. We generalize the clustering approach of a recent differential attack on the tweakab...

2007
P. FREITAS

We investigate the problem of minimizing the moment of inertia among convex surfaces in R having a specified surface area. First we prove a minimizing surface exists, and derive a necessary condition holding at points of positive curvature. Then we show that an equilateral triangular prism is the optimal triangular prism, that the cube is the optimal rectangular prism, and that the sphere is (l...

Journal: :Proteins 2006
Luca Marsella

We present a study on the near equilibrium dynamics of two small proteins in the family of truncated hemoglobins, developed under the framework of a Gaussian network approach. Effective beta carbon atoms are taken into account besides Calphas for all residues but glycines in the coarse-graining procedure, without leading to an increase in the degrees of freedom (beta Gaussian Model). Normalized...

Journal: :Des. Codes Cryptography 2011
Céline Blondeau Benoît Gérard Jean-Pierre Tillich

Many attacks on encryption schemes rely on statistical considerations using plaintext/ciphertext pairs to find some information on the key. We provide here simple formulae for estimating the data complexity and the success probability which can be applied to a lot of different scenarios (differential cryptanalysis, linear cryptanalysis, truncated differential cryptanalysis, etc.). Our work does...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید