1,801 results on '"Cherniavsky A"'
Search Results
2. Mechanical Properties of Materials in the Calculations of a Low-Cycle Deformation of Structures
3. Experimental and numerical investigation on cold cracking susceptibility of naval grade high strength steel welds for lightweight shipbuilding structures
4. New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs.
5. Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields.
6. Constructing Leakage-Resilient Shamir’s Secret Sharing: Over Composite Order Fields
7. On distribution of the depth index on perfect matchings
8. Acquired uterine artery pseudoaneurysm: a rare iatrogenic complication following cesarean delivery at complete cervical dilatation
9. Using Online Textbook and In-Class Poll Data to Predict In-Class Performance
10. Myocardial protection with phosphocreatine in high-risk cardiac surgery patients: a randomized trial
11. Experimental and numerical investigation on cold cracking susceptibility of naval grade high strength steel welds for lightweight shipbuilding structures
12. Investigation of TiNi shape memory alloy for thermosensitive wire drive
13. Myocardial protection with phosphocreatine in high-risk cardiac surgery patients: a randomized trial
14. Study of Material Properties under Complex Conditions of Low-Cycle Deformation
15. MPC with Low Bottleneck-Complexity: Information-Theoretic Security and More.
16. Patency and Durability of Stent Grafts Placed in the Dialysis Circuit Cannulation Zone
17. Distribution of Aeration and Pulmonary Blood Volume in Healthy, ARDS and COVID-19 Lungs: A Dual-Energy Computed Tomography Retrospective Cohort Study
18. Temperature dependence of the probability of 'small heating' and total losses of ucns on the surface of fomblin oils of different molecular mass
19. Minimally Invasive Procedures in the Diagnosis and Treatment of Localized Prostate Cancer: an Interventional Radiologist’s Perspective
20. Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.
21. Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing.
22. On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness.
23. Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.
24. PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection.
25. On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness
26. Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
27. A Geometric Interpretation of the Intertwining Number
28. The Learning Grid
29. Cultural Studies Revisited: Determinate Conditions and the Depressive Position
30. New results in Share Conversion, with applications to evolving access structures.
31. Quantum Evolving Secret Sharing for General Access Structures.
32. A change in the deformation mechanism with a monotonous change of the load parameter
33. Epidemiologic, microbiologic and imaging characteristics of urinary tract infections in hospitalized children < 2 years of age diagnosed with anatomic abnormalities of the urinary tract
34. Stirling Posets
35. Epidemiologic, microbiologic and imaging characteristics of urinary tract infections in hospitalized children < 2 years of age diagnosed with anatomic abnormalities of the urinary tract
36. Early experience with the Abre venous stent for central venous stenoses and occlusions in hemodialysis patients.
37. Nanostructured AlCoFeCrVNi and AlCoFeCrVTi high-entropy alloys resulted from mechanical alloying and sintering
38. Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks.
39. Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages.
40. Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes.
41. Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes
42. Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
43. IMPACTS OF RENEWABLE ENERGY ON UKRAINE’S ENERGY SUSTAINABILITY
44. On perfectly secure 2PC in the OT-hybrid model
45. On (the Impossibility of) Teaching Gayle Rubin
46. On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness
47. Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family
48. On Polynomial Secret Sharing Schemes.
49. MPC with Friends and Foes.
50. Arresting Longitudinal Cracks in Steel Pipelines: Computational Analysis Technique
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.