Search

Your search keyword '"Ma, Ziqiang"' showing total 240 results

Search Constraints

Start Over You searched for: Author "Ma, Ziqiang" Remove constraint Author: "Ma, Ziqiang"
240 results on '"Ma, Ziqiang"'

Search Results

7. Protecting Private Keys of Dilithium Using Hardware Transactional Memory

8. Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature

12. X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency

14. A numerical study on the thermocapillary migration of a droplet under microgravity with periodic thermal boundaries using the front-tracking method

18. Applications and Developments of the Lattice Attack in Side Channel Attacks

19. Exploring the Security of Certificate Transparency in the Wild

20. Evaluating the Cache Side Channel Attacks Against ECDSA

31. RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks

33. virtio-ct: A Secure Cryptographic Token Service in Hypervisors

40. A numerical study on the thermocapillary migration of a droplet under microgravity with periodic thermal boundaries using the front-tracking method

41. PCSSR‐DNNWA: A Physical Constraints Based Surface Snowfall Rate Retrieval Algorithm Using Deep Neural Networks With Attention Module.

42. A Snowfall Detection Algorithm for Fengyun-3D Microwave Sounders with Differentiated Atmospheric Temperature Conditions.

43. Solid-state corrosion of lithium for prelithiation of SiOx-C composite anode with carbon-incorporated lithium phosphorus oxynitride.

49. Spatiotemporal characteristics of precipitation extremes based on reanalysis precipitation data during 1950–2020 over the Ganjiang River Basin and its surroundings, China.

50. High-resolution typhoon precipitation integrations using satellite infrared observations and multisource data

Catalog

Books, media, physical & digital resources