نتایج جستجو برای: ggh
تعداد نتایج: 171 فیلتر نتایج به سال:
Background: The corona virus disease also known as COVID-19 has opened gates to a lot of research about detection, treatment and prevention in the last past year due lack information regarding SARS-CoV-2 virus. PCR via nasopharyngeal swab is standard method detection our set-up. Materials methods: Nasopharyngeal swabs were taken by ENT department using precautions following proper SOPs. Swabs s...
We report pK(a) values with measurement uncertainties for all labile protons of the 27 tri-peptides prepared from the amino acids glutamic acid (E), glycine (G) and histidine (H). Each tri-peptide (GGG, GGE, GGH, …, HHH) was subjected to alkali titration and pK(a) values were calculated from triplicate potentiometric titrations data using HyperQuad 2008 software. A generalized multiplicative an...
An infinite f.g. group G is quasi-finitely axiomatizable (QFA) if there is a first-order sentence j such that G ! j, and if H is a f.g. group such that H ! j, then GGH. The first result is that all Baumslag–Solitar groups of the form ha; d j d"1ad 1⁄4 ai are QFA. A f.g. group G is a prime model if and only if there is a tuple g1; . . . ; gn generating G whose orbit (under the automorphisms of G...
BACKGROUND Methotrexate (MTX) is currently the anchor drug widely used worldwide in the treatment of rheumatoid arthritis (RA). However, the therapeutic response to MTX has been shown to vary widely among individuals, genders and ethnic groups. The reason for this has been not clarified but it is considered to be partially due to several mechanisms in the cellular pathway of MTX including singl...
60 @ 2012, IJCCN All Rights Reserved ABSTRACT In this paper, we present a new lattice-based public-key cryptosystem mixed with a factoring (RSA), which has reasonable key size and quick encryption and decryption. We consider the situation that the RSA secret key d is small and a sufficient amount of the LSBs (least significant bits) of d are known by the attacker. We show that our lattice con...
At Eurocrypt ’06, Nguyen and Regev presented a new key-recovery attack on the GoldreichGoldwasser-Halevi (GGH) lattice-based signature scheme: when applied to NTRUSign-251 without perturbation, the attack recovers the secret key given only 90,000 signatures. At the rump session, Whyte speculated whether the number of required signatures might be significantly decreased to say 1,000, due to the ...
In March, 2015 Gu Chunsheng proposed a candidate ideal multilinear map [9]. An ideal multilinear map allows to perform as many multiplications as desired, while in κ-multilinear maps like GGH [5] or CLT [3,4] one we can perform at most a predetermined number κ of multiplications. In this note, we show that the extraction Multilinear Computational Diffie-Hellman problem (extMCDH) associated to G...
The Goldreich-Goldwasser-Halevi(GGH)’s signature scheme from Crypto ’99 is cryptanalyzed, which is based on the well-known lattice problem. We mount a chosen message attack on the signature scheme, and show the signature scheme is vulnerable to the attack. We collects n lattice points that are linearly independent each other, and constructs a new basis that generates a sub-lattice of the origin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید