UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 407
1.
  • Effect of electromagnetic s... Effect of electromagnetic stirring on the enrichment of primary silicon from Al–Si melt
    Yu, Wenzhou; Ma, Wenhui; Lv, Guoqiang ... Journal of crystal growth, 11/2014, Letnik: 405
    Journal Article
    Recenzirano

    The effect of electromagnetic stirring on the enrichment of primary silicon from Al–Si melt during the process of electromagnetic separation was investigated. It is shown that the enrichment of ...
Celotno besedilo
2.
  • Seasonal Features and a Cas... Seasonal Features and a Case Study of Tropopause Folds over the Tibetan Plateau
    Luo, Jiali; Liang, Wenjun; Xu, Pingping ... Advances in meteorology, 2019, Letnik: 2019
    Journal Article
    Recenzirano
    Odprti dostop

    Tropopause fold is the primary mechanism for stratosphere-troposphere exchange (STE) at the midlatitudes. Investigation of the features of tropopause folds over the Tibetan Plateau (TP) is important ...
Celotno besedilo

PDF
3.
  • Fault attacks on hyperellip... Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
    Wang, MingQiang; Xue, HaiYang; Zhan, Tao Science China. Information sciences, 02/2014, Letnik: 57, Številka: 3
    Journal Article
    Recenzirano

    In this paper, we present invalid-curve attacks that apply to the hyperelliptic curve scalar multi- plication (HECSM) algorithm proposed by Avanzi et al. on the genus 2 hyperelliptic curve over ...
Celotno besedilo
4.
  • Regular lossy functions and... Regular lossy functions and their applications in leakage-resilient cryptography
    Chen, Yu; Qin, Baodong; Xue, Haiyang Theoretical computer science, 08/2018, Letnik: 739
    Journal Article
    Recenzirano
    Odprti dostop

    In STOC 2008, Peikert and Waters introduced a powerful primitive called lossy trapdoor functions (LTFs). In a nutshell, LTFs are functions that behave in one of two modes. In the normal mode, ...
Celotno besedilo
5.
  • Selective separation Al3+/G... Selective separation Al3+/Gd3+ by designed carboxylic acid-ionic liquid with low acid and alkali consumption
    Zhang, Nian; Li, Fujian; Hu, Kaibo ... Separation and purification technology, 08/2023, Letnik: 318
    Journal Article
    Recenzirano

    •Six carboxylic ionic liquids were synthesized to selectively separate Al3+/Gd3+.•High Al3+/Gd3+ separation factor of 923 was achieved by N1888C7H11O2 for industrial GdCl3 feed.•High Al3+ removal ...
Celotno besedilo
6.
  • Novel Secure Outsourcing of... Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus
    Tian, Chengliang; Yu, Jia; Zhang, Hanlin ... IEEE transactions on services computing, 2022-Jan.-Feb.-1, 2022-1-1, Letnik: 15, Številka: 1
    Journal Article
    Recenzirano

    In cryptography and algorithmic number theory, modular inversion is viewed as one of the most common and time-consuming operations. It is hard to be directly accomplished on resource-constrained ...
Celotno besedilo
7.
  • High-efficiency process of ... High-efficiency process of aluminum removal from rare earth solutions using a readily industrialized ionic liquid
    Zhang, Nian; Li, Fujian; Xue, Haiyang ... Hydrometallurgy, January 2024, 2024-01-00, Letnik: 223
    Journal Article
    Recenzirano

    Aluminum (Al) is often associated with rare earth resources, and the removal of Al3+ from rare earth elements (REEs) is a difficult task due to its amphoteric properties. Aluminum ions (Al3+) enrich ...
Celotno besedilo
8.
  • Efficient Verifiably Encryp... Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions
    Yang, Xiao; Zhang, Chengru; Xue, Haiyang ... IEEE transactions on information forensics and security, 2024, Letnik: 19
    Journal Article
    Recenzirano

    A Verifiably Encrypted Signature (VES) scheme encrypts a digital signature in a way that allows the public to verify the validity of the encrypted signature. Recently, several practical VES schemes ...
Celotno besedilo
9.
  • Separation Mechanism of Pri... Separation Mechanism of Primary Silicon from Hypereutectic Al-Si Melts Under Alternating Electromagnetic Fields
    Xue, Haiyang; Lv, Guoqiang; Ma, Wenhui ... Metallurgical and materials transactions. A, Physical metallurgy and materials science, 07/2015, Letnik: 46, Številka: 7
    Journal Article
    Recenzirano

    Solar grade silicon (SOG-Si) and hypereutectic Al-Si alloys with low silicon (silicon composition below 25 pct) can be successfully obtained by separation of hypereutectic Al-Si alloy with high ...
Celotno besedilo
10.
  • P²FRPSI: Privacy-Preserving... P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection
    Ling, Guowei; Tang, Fei; Cai, Chaochao ... IEEE transactions on information forensics and security, 2024, Letnik: 19
    Journal Article
    Recenzirano

    Private Set Intersection (PSI) protocols can securely compute the intersection of the private sets on the server and the client without revealing additional data. This work introduces the concept of ...
Celotno besedilo
1 2 3 4 5
zadetkov: 407

Nalaganje filtrov