標(biāo)題: Titlebook: Symposia on Theoretical Physics; 2 Lectures presented Alladi Ramakrishnan (Director of the Institute) Book 1966 Plenum Press 1966 Potential [打印本頁] 作者: Jackson 時間: 2025-3-21 18:14
書目名稱Symposia on Theoretical Physics影響因子(影響力)
書目名稱Symposia on Theoretical Physics影響因子(影響力)學(xué)科排名
書目名稱Symposia on Theoretical Physics網(wǎng)絡(luò)公開度
書目名稱Symposia on Theoretical Physics網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Symposia on Theoretical Physics被引頻次
書目名稱Symposia on Theoretical Physics被引頻次學(xué)科排名
書目名稱Symposia on Theoretical Physics年度引用
書目名稱Symposia on Theoretical Physics年度引用學(xué)科排名
書目名稱Symposia on Theoretical Physics讀者反饋
書目名稱Symposia on Theoretical Physics讀者反饋學(xué)科排名
作者: 祖先 時間: 2025-3-21 21:57
https://doi.org/10.1007/978-1-4684-7752-8Potential; electrodynamics; elementary particle physics; energy; field theory; invariant; many-body proble作者: Slit-Lamp 時間: 2025-3-22 02:34
Construction of the Invariants of the Simple Lie Groups,th which we are familiar. For this group, the infinitesimal generators ., i = 1, 2, 3, satisfy the commutation relations . and there exists a polynomial in the ., namely, . which has the property that it commutes with . of the infinitesimal generators: 作者: engagement 時間: 2025-3-22 04:48 作者: 小說 時間: 2025-3-22 09:47 作者: 震驚 時間: 2025-3-22 14:56 作者: 態(tài)學(xué) 時間: 2025-3-22 19:12
Recent Mathematical Developments in Cascade Theory,degree of sophistication.. As is often the case at this point, our understanding of the physical situation with respect to cascade theory is not satisfactory, but rather is so unsatisfactory that the problem demands immediate solution. To this end, I shall attempt to develop an electromagnetic cascade theory in the present paper.作者: tattle 時間: 2025-3-23 00:50
Large-Angle Elastic Scattering at High Energies,High-energy scattering under reproducible conditions has been investigated for primary proton energies of up to 30 GeV at Brookhaven and CERN. The process can be divided into three main types:作者: 離開可分裂 時間: 2025-3-23 03:12 作者: 重畫只能放棄 時間: 2025-3-23 08:58
Some Applications of Separable Potentials in Elementary Particle Physics,Our group at Delhi University has recently done some work on the application of the so-called separable interactions to certain problems of current interest in elementary particle physics.作者: IRATE 時間: 2025-3-23 12:06
plication at classical cryptography security levels (NIST curves). Our implementation uses 35?% less LUTs compared to the state of the art generic implementation of ECC using RNS for the same performance [.]. We also slightly improve the computation time (latency) and our implementation shows best r作者: Flawless 時間: 2025-3-23 17:08 作者: Palpate 時間: 2025-3-23 19:38
L. O’Raifeartaighced at CHES 2012. We first detail is performances. Then we analyze it against standard differential power analysis and discuss the different parameters influencing its security bounds. Finally, we put forward that its implementation in 8-bit microcontrollers can provide a better security vs. perform作者: 6Applepolish 時間: 2025-3-24 02:02 作者: Lacerate 時間: 2025-3-24 05:41
R. Hagedornssembly generation. For this purpose, our first contribution is a simple reduction from security proofs obtained in a (usual but not always realistic) model where leakages depend on the intermediate variables manipulated by the target device, to security proofs in a (more realistic) model where the 作者: 紅腫 時間: 2025-3-24 08:24
M. Jacobplication at classical cryptography security levels (NIST curves). Our implementation uses 35?% less LUTs compared to the state of the art generic implementation of ECC using RNS for the same performance [.]. We also slightly improve the computation time (latency) and our implementation shows best r作者: 廢除 時間: 2025-3-24 13:53
K. Venkatesanalance) best choice is to utilise an acyclic graph in an independent graph combination setting, which gives us provable convergence to the correct key distribution. We provide evidence using both extensive simulations and a final confirmatory analysis on real trace data.作者: 脆弱帶來 時間: 2025-3-24 16:53 作者: 食草 時間: 2025-3-24 20:17
B. M. Udgaonkaro improve the algebraic complexity of the scheme) with standard additive Boolean masking (to allow efficient higher-order implementations). We show that such a masking is well suited for application to bitslice ciphers. We also conduct a comprehensive security analysis of the proposed scheme. For th作者: HERTZ 時間: 2025-3-25 02:27
A. N. Mitraformative feature extraction in presence of masking countermeasure. This method, called Kernel Discriminant Analysis, consists in completing the Linear Discriminant Analysis with a so-called kernel trick, in order to efficiently perform it over the set of all possible .-tuples of points without grow作者: 展覽 時間: 2025-3-25 04:32
T. K. Radhaper, we demonstrate a proof-of-concept implementation of the Swiss-Knife DB protocol on smartphones running in RFID-emulation mode. To our best knowledge, this is the first time that such an implementation has been performed. Our experimental results are encouraging as they show that relay attacks i作者: Climate 時間: 2025-3-25 11:06 作者: LAP 時間: 2025-3-25 14:11 作者: chemoprevention 時間: 2025-3-25 19:18
S. P. Misrantain control-flow integrity in the setting of fault attacks. The technique is based on so-called generalized path signatures, which have initially been introduced in the context of soft errors. We present a prototype implementation for a Cortex-M3 microprocessor and corresponding compiler extension作者: MOT 時間: 2025-3-25 22:40
Hugh DeWittntain control-flow integrity in the setting of fault attacks. The technique is based on so-called generalized path signatures, which have initially been introduced in the context of soft errors. We present a prototype implementation for a Cortex-M3 microprocessor and corresponding compiler extension作者: Sinus-Rhythm 時間: 2025-3-26 00:30
Franz Mohlingntain control-flow integrity in the setting of fault attacks. The technique is based on so-called generalized path signatures, which have initially been introduced in the context of soft errors. We present a prototype implementation for a Cortex-M3 microprocessor and corresponding compiler extension作者: Ligneous 時間: 2025-3-26 05:50
M. H. Stoneptional modifications of list signature schemes such as anonymity revocation. We then propose more efficient list signature schemes, by using a smart card to produce the signature. We finally propose some concrete implementations of our proposals. As a result, we obtain more efficient solutions that作者: 粗語 時間: 2025-3-26 11:16
A. T. Bharucha-Reidts of smart-card research: Java cards, elect- nic commerce applications, e?ciency, security (including cryptographic al- rithms, cryptographic protocols, and authentication), and architecture. Subm- sions from Europe, the U.S., Asia, and Australia show that this is indeed an international area of re作者: 領(lǐng)袖氣質(zhì) 時間: 2025-3-26 14:57 作者: temperate 時間: 2025-3-26 18:33 作者: 廣大 時間: 2025-3-27 00:39
Form Factors of the Three-Nucleon Systems 3H and 3He,ainly by the odd nucleon in both cases. Also, the charge in the case of .H is carried by the odd nucleon, while in the case of .He the charge is carried by the like particles. Thus, the experimental observations suggest a distribution for each of the like pair which is different from that of the odd作者: Ambiguous 時間: 2025-3-27 03:22
Muon Capture by Complex Nuclei, the heavier nuclei. The interaction Hamiltonian of the basic elementary processes . + . → . is not yet well known. Although the universal Fermi interaction is assumed to be operative in the weak processes such as β-decay, μ-decay, and μ-capture, only the μ-decay is free from the effects of strong i作者: 四目在模仿 時間: 2025-3-27 06:50
Semigroup Methods in Mathematical Physics, of operators are the subject of lecture notes by the author. and Yosida.; chapters on semigroups of operators can be found in the books of Dunford and Schwartz,. Maurin,. and Riesz and Sz.Nagy.. We also refer to the papers of Phillips,. the first of which presents a survey of semigroup theory, whil作者: 2否定 時間: 2025-3-27 10:49 作者: Decongestant 時間: 2025-3-27 15:40 作者: GEM 時間: 2025-3-27 19:25 作者: 潔凈 時間: 2025-3-27 23:24 作者: 撤退 時間: 2025-3-28 02:51
L. O’Raifeartaighast expected to increase the number of measurements of successful attacks to some reasonable extent, and at best to guarantee a bounded time complexity independent of the number of measurements. This latter guarantee, only possible in the context of leakage-resilient constructions, was only reached 作者: Working-Memory 時間: 2025-3-28 10:05
N. R. Ranganathanast expected to increase the number of measurements of successful attacks to some reasonable extent, and at best to guarantee a bounded time complexity independent of the number of measurements. This latter guarantee, only possible in the context of leakage-resilient constructions, was only reached 作者: 奇怪 時間: 2025-3-28 10:46 作者: 癡呆 時間: 2025-3-28 18:22
M. Jacobs paper, we are rewriting the conditions of Kawamura’s theorem for the base extension without error in order to define the maximal range of the set from which the moduli can be chosen to build a base. At the same time, we give a procedure to compute correctly the truncation function of the Cox modul作者: Atrium 時間: 2025-3-28 21:58
K. Venkatesanproposed for the specific use in side channel analysis by Veyrat-Charvillon et al. [.]..We define a novel metric to capture the . of variable nodes in factor graphs, we propose two improvements to the sum-product algorithm for the specific use case in side channel analysis, and we explicitly define 作者: subordinate 時間: 2025-3-28 23:00
K. Ramantations against side-channel attacks. Despite known limitations (e.g., risks of false negatives and positives), it is sometimes considered as a pass-fail test to determine whether such implementations are “safe” or not (without clear definition of what is “safe”). In this note, we clarify the limite作者: 隨意 時間: 2025-3-29 05:10
B. M. Udgaonkarads. Boolean masking is one extreme example of this tradeoff: its algebraic structure is as simple as can be (and so are its implementations), but it typically suffers more from implementation weaknesses. For example knowing one bit of each share is enough to know one bit of secret in this case. Inn作者: Flavouring 時間: 2025-3-29 07:18
A. N. Mitrants. They aim to detect the so-called . (PoIs), which are time samples which (jointly) depend on some sensitive information (. secret key sub-parts), and exploit them to extract information. The extraction is done through the use of functions which combine the measurement time samples. Examples of c作者: ANA 時間: 2025-3-29 14:22 作者: 搜尋 時間: 2025-3-29 18:16
V. Devanathanardware-based security as proposed by the Trusted Computing Group is usually not part of mobile devices, yet. We present the design and implementation of seTPM, a secure element based TPM, utilizing Java Card technology. seTPM establishes trust in mobile devices by enabling Trusted Computing based i作者: 按等級 時間: 2025-3-29 22:02 作者: hemophilia 時間: 2025-3-30 02:46
S. P. Misration of cryptographic primitives. However, also fault attacks on the control flow of software can compromise the security of a system completely. Fault attacks on the control flow can for example make a system branch to an administrative function directly or make it bypass comparisons of redundant c作者: mucous-membrane 時間: 2025-3-30 05:33
Hugh DeWitttion of cryptographic primitives. However, also fault attacks on the control flow of software can compromise the security of a system completely. Fault attacks on the control flow can for example make a system branch to an administrative function directly or make it bypass comparisons of redundant c作者: reserve 時間: 2025-3-30 09:20 作者: 有毒 時間: 2025-3-30 13:10
M. H. Stonem is the group signature [1, 5, 8]. Each member of the group is able to anonymously produce a signature on behalf of the group and a designated authority can, in some cases, revoke this anonymity..During the last decade, many anonymous services using this concept have been proposed: electronic aucti作者: 合唱團 時間: 2025-3-30 18:26 作者: Host142 時間: 2025-3-30 22:34 作者: Gobble 時間: 2025-3-31 02:11 作者: intrude 時間: 2025-3-31 06:56
Visiting Professor of the year - Professor L. Rosenfeld, Deputy Director of NORDIT A, Copenhagen, and the Editor of Nuclear Physics. With particular appropriateness, the Symposium was inaugu- rated by the Honorable C. Subramaniam, Union Cabinet Minister, the founding father of the Institute. The mee作者: 可憎 時間: 2025-3-31 11:19
On Peratization Methods,cts due to higher order weak interactions could be neglected. Further, since the weak interactions are unrenormalizable (in the normal sense), no serious attempt was made to calculate the higher order graphs.作者: 文藝 時間: 2025-3-31 14:59 作者: 后天習(xí)得 時間: 2025-3-31 20:07 作者: atrophy 時間: 2025-4-1 01:23
Introduction to Quantum Statistics of Degenerate Bose Systems,tistical mechanical argument, to the important result for the average number of quanta in a single state: . where .. By a “simple state” was meant an element of phase space Ωσ. which equals . (Ω= volume of system). This simple formula could then be used to derive the thermodynamic properties of blackbody radiation by elementary means.作者: Galactogogue 時間: 2025-4-1 03:34
Effective-Range Approximation Based on Regge Poles,entum plane provides a very good description of low-energy scattering of, for example, the . system. We shall see in what follows how singularities in the complex angular momentum plane can also be used for the same purpose.作者: Bronchial-Tubes 時間: 2025-4-1 06:19
Origin of Internal Symmetries,ric relations between “inertial” systems for which the laws of physics are the same, and the .. We call the symmetry “internal” because we see only its manifestations; there is no primitive geometric characterization of the symmetry group from any fundamental dynamic principle. We shall try to see t作者: abnegate 時間: 2025-4-1 13:43
Construction of the Invariants of the Simple Lie Groups,th which we are familiar. For this group, the infinitesimal generators ., i = 1, 2, 3, satisfy the commutation relations . and there exists a polynomial in the ., namely, . which has the property that it commutes with . of the infinitesimal generators: 作者: 幼稚 時間: 2025-4-1 15:35 作者: 顯而易見 時間: 2025-4-1 21:50
Crossing Relations and Spin States,n incoming (outgoing) particle of momentum . by an outgoing (incoming) antiparticle of momentum — .. It is the sign of the time component that decides whether a line represents an incoming particle or an outgoing antiparticle.