首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   247篇
  免费   46篇
  国内免费   14篇
化学   70篇
晶体学   2篇
力学   61篇
综合类   16篇
数学   44篇
物理学   114篇
  2024年   1篇
  2023年   4篇
  2022年   6篇
  2021年   10篇
  2020年   9篇
  2019年   4篇
  2018年   6篇
  2017年   6篇
  2016年   12篇
  2015年   9篇
  2014年   29篇
  2013年   22篇
  2012年   19篇
  2011年   15篇
  2010年   13篇
  2009年   11篇
  2008年   19篇
  2007年   22篇
  2006年   13篇
  2005年   12篇
  2004年   18篇
  2003年   4篇
  2002年   7篇
  2001年   1篇
  2000年   6篇
  1999年   5篇
  1998年   1篇
  1997年   4篇
  1996年   4篇
  1995年   3篇
  1994年   2篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1984年   1篇
  1979年   1篇
  1977年   1篇
排序方式: 共有307条查询结果,搜索用时 31 毫秒
91.
Public-Key Cryptography (PKC) based on multivariate quadratic equations is one of the most promising alternatives for classical PKC after the eventual coming of quantum computers. Recently, Shen and Tang proposed a new MQ-signature scheme, RGB, based on three types of variables, Red(r), Green(g) and Blue(b). They claimed that signing for RGB is faster than that of UOV and Rainbow. At ACISP 2016, Tang et al. implemented RGB on S5PV210 and MT6582 microprocessors at 64, 80, 96, 118 and 128-bit security levels for practical use. Their results are much more efficient than other MQ-signature schemes, so RGB is very appealing for resource-limited devices. We show that RGB with their suggested parameters at 64, 80, 96, 118 and 128 security levels are entirely broken by key recovery attacks using good keys. From a practical point of view, we are able to break their parameters at 64, 80, 96, 118 and 128 security levels in less than 0.48 seconds, 1.7 seconds, 90.68 seconds, 11 minutes and 6.82 hours, respectively. Consequently, we show that signing and the key sizes for RGB with secure parameter sets are much slower and larger than those of UOV and Rainbow.  相似文献   
92.
We propose a unidimensional two-way continuous-variable quantum key distribution protocol with coherent states, where the sender modulates a single quadrature of the coherent states rather than both quadratures to simplify the structure of a two-way system. Security analysis is performed with a general attack strategy, known as two-mode attack, which helps to reduce limitations in the analysis. The performance of the protocol under all accessible two-mode attacks at fixed distance is illustrated. Further, two typical two-mode attack strategies are obtained from it, which are one-mode attack strategy and optimal two-mode attack strategy. Between them, the one-mode attack is the simplest form of the two-mode attack, while the optimal two-mode attack is the most complicated one. Simulations show that though the system is simplified, the performance of the two-way protocol with unidimensional modulation is still comparable to that of the counterpart with Gaussian modulation even against the optimal two-mode attack when Eve’s ability is maximized. Thus, the proposed protocol simplifies the two-way system while guaranteeing its performance to a certain extent. Especially in a practical system with short transmission distance and high excess noise, the protocol has a good application prospect.  相似文献   
93.
联合直接攻击弹药精确制导技术分析   总被引:3,自引:0,他引:3  
从技术分析的角度对联合直接攻击弹药(JDAM)的武器制导系统进行了研究。安装JDAM制导控制装置的弹药武器,通过GPS/INS组合制导和尾翼调节,控制武器精确命中目标。在对JDAM系统组成和精度分析的基础上,详细讨论了JDAM系统的卡尔曼滤波器、捷联惯性导航技术、传递对准和GPS辅助惯性制导等技术。对设计中遇到主要的技术难点和相应的解决途径也进行了分析。  相似文献   
94.
有序态Fe3Al合金在水环境中的磨粒磨损行为   总被引:1,自引:0,他引:1  
涂江平  孟亮 《摩擦学学报》1998,18(3):215-220
研究了不同载荷下含Cr的B2和DO3有序态Fe3Al合金在水中的磨粒磨损行为。采用扫描电镜分析了合金的磨损表面形貌和磨屑形貌。二次离子质谱分析结果表明:在水环境磨损条件下,随着载荷的增加,进入Fe3Al合金表层的氢浓度升高,合金表层的氢损伤加剧。在高载荷下由机械磨损所引起的材料流失仍占主导地位,相同载荷下B2有序态Fe3Al合金的磨损质量损失比DO3有序态Fe3Al合金低。  相似文献   
95.
鄂秦  杨国伟  李杰 《力学学报》1996,28(6):730-735
采用保角变换与代数方法相结合,生成全场统一的贴体、正交O-H型网格.采用有限体积法求解Euler方程,模拟具有歼击机外形的全机及翼身组合体大迎角跨音速绕流.计算表明,法向力系数、气动中心位置及压力分布的计算结果与实验结果吻合良好  相似文献   
96.
证实了一种使用参考光波的光学联合相关变换加密系统对于选择明文攻击的脆弱性。在该加密系统中,通过选择一个透过率为零的特殊明文图像,记录其对应的联合功率谱,之后再通过遮挡输入面获取参考光波强度、遮挡参考光和明文获得加密密钥的傅里叶变换强度,根据获得的3幅图像,攻击者可以准确地获取加密所用的密钥,进而可以恢复出原始图像。理论分析和计算机模拟结果均证明所提攻击方法的有效性。  相似文献   
97.
李超  聂敏 《光子学报》2014,41(10):1256-1260
提出了一个多用户量子信令树型传输系统,并详细阐述了信令的传输过程.研究了系统中信令受到特洛伊木马攻击的损伤模型及其修复的必要性.将量子密钥分发的思想引入量子信令安全的直接通信中,分析了采用非正交量子态,以克服特洛伊木马攻击的问题,从而提高了信令传输的安全性.对多用户量子信令树型传输系统进行改进,提出了新的广义的多用户量子信令树型拓扑传输模型.研究结果表明,本文所提出的对多用户信令攻击的修复策略可有效地防止特洛伊木马攻击,从而保证信令传输过程安全有效的进行.  相似文献   
98.
The reactivity of disulfide and diselenide derivatives towards F? and CN? nucleophiles has been investigated by means of B3PW91/6‐311+G(2df,p) calculations. This theoretical survey shows that these processes, in contrast with the generally accepted view of disulfide and diselenide linkages, do not always lead to S? S or Se? Se bond cleavage. In fact, S? S or Se? Se bond fission is the most favorable process only when the substituents attached to the S or the Se atoms are not very electronegative. Highly electronegative substituents (X) strongly favor S? X bond fission. This significant difference in the observed reactivity patterns is directly related to the change in the nature of the LUMO orbital of the disulfide or diselenide derivative as the electronegativity of the substituents increases. For weakly electronegative substituents, the LUMO is a σ‐type S? S (or Se? Se) antibonding orbital, but as the electronegativity of the substituents increases the π‐type S? X antibonding orbital stabilizes and becomes the LUMO. The observed reactivity also changes with the nature of the nucleophile and with the S or Se atom that undergoes the nucleophilic attack in asymmetric disulfides and diselenides. The activation strain model provides interesting insights into these processes. There are significant similarities between the reactivity of disulfides and diselenides, although some dissimilarities are also observed, usually related to the different interaction energies between the fragments produced in the fragmentation process.  相似文献   
99.
In order to increase the accuracy of turbulence field reconstruction, this paper combines experimental observation and numerical simulation to develop and establish a data assimilation framework, and apply it to the study of S809 low-speed and high-angle airfoil flow. The method is based on the ensemble transform Kalman filter(ETKF) algorithm, which improves the disturbance strategy of the ensemble members and enhances the richness of the initial members by screening high flow field sensitivity ...  相似文献   
100.
逆同余发生器的密码分析   总被引:1,自引:0,他引:1  
使用格中的最短向量对未知向量进行逼近的方法,证明了在已知乘子a和模数p的条件下,若连续的wi满足|ui-wi|是一个很小的数时,在多项式时间内可以恢复出逆同余发生器的移位B. 本文的结论表明将逆同余发生器直接应用于密码学必须十分慎重.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号