![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessSegmentation of void defects in X-ray images of chip solder joints based on PCB-DeepLabV3 algorithm
Defects within chip solder joints are usually inspected visually for defects using X-ray imaging to obtain images. The phenomenon of voids inside solder joints is one of the most likely types of defects in the...
-
Article
Multiscale fire image detection method based on CNN and Transformer
Fire is one of the most harmful hazards that affect daily life. The existing fire detection methods have the problems of large computation, slow detection speed, and low detection accuracy to varying degrees, ...
-
Article
Effect of Ultrasonic Impact Treatment with Different Impact Energy and Head Shape on Surface Properties of U75V Heavy Rail
Surface properties directly affect the service life of heavy rail. The effect of ultrasonic impact energy and head shape on surface hardness, residual stress, morphology of heavy rail was investigated in this ...
-
Article
Effects of multi-pass turning on surface properties of AISI 52100 bearing steel
Hard turning is extensively used in the machining of bearings. The turning process has a significant influence on the properties of machined surface. In this paper, multi-pass turning experiments were machined...
-
Article
Study on Wet Chemical Etching of Flexible Printed Circuit Board with 16-μm Line Pitch
As high-precision flexible printed circuit boards (FPCBs) are required in electronic products, it is necessary to study wet chemical etching to obtain precise FPCBs with a 16-μm line pitch. First, a π-shaped FPCB...
-
Article
Distribution, Source Apportionment and Risk Assessment of Polycyclic Aromatic Hydrocarbons (PAHs) in Surface Sediments at the Basin Scale: A Case Study in Taihu Basin, China
As a systematic research at basin scale, this study investigated the spatial distribution, source apportionment and ecological risks of eighteen polycyclic aromatic hydrocarbons (PAHs) in surface sediments at ...
-
Article
A modified hybrid rice optimization algorithm for solving 0-1 knapsack problem
The 0-1 knapsack problem (KP) is a classic NP-hard problem and could be handled by swarm intelligence algorithms. However, most of these algorithms might be trapped in the local optima as the scale increases. ...
-
Article
Open Access(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy
Dual receiver encryption (DRE) is an important cryptographic primitive introduced by Diament et al. at CCS’04, which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext. ...
-
Chapter and Conference Paper
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope
The Number Theoretic Transform (NTT) provides efficient algorithm for multiplying large degree polynomials. It is commonly used in cryptographic schemes that are based on the hardness of the Ring Learning With...
-
Chapter and Conference Paper
Towards Tightly Secure Deterministic Public Key Encryption
In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumpti...
-
Chapter and Conference Paper
Compact Hierarchical IBE from Lattices in the Standard Model
At Crypto’10, Agrawal et al. proposed a lattice-based selectively secure Hierarchical Identity-based Encryption (HIBE) scheme (ABB10b) with small ciphertext on the condition that
-
Chapter and Conference Paper
Compact (Targeted Homomorphic) Inner Product Encryption from LWE
Inner product encryption (IPE) is a public-key encryption mechanism that supports fine-grained access control. Agrawal et al. (ASIACRYPT 2011) proposed the first IPE scheme from the Learning With Errors (LWE) ...
-
Chapter and Conference Paper
Lattice-Based Dual Receiver Encryption and More
Dual receiver encryption (DRE), proposed by Diament et al. at ACM CCS 2004, is a special extension notion of public-key encryption, which enables two independent receivers to decrypt a ciphertext into a same p...
-
Chapter and Conference Paper
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters
**e et al. (SCN 2012) proposed the first deterministic identity-based encryption (DIBE) scheme with an adaptive security in the auxiliary-input setting, under the learning with errors (LWE) assumption. However...