期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
斜仰卧截石位一期输尿管镜联合经皮肾镜治疗同侧肾输尿管结石 被引量:13
1
作者 孙志军 赖学佳 +1 位作者 冯思客 方立 《中国微创外科杂志》 CSCD 北大核心 2020年第6期520-522,共3页
目的探讨斜仰卧截石位一期双镜联合(输尿管硬镜联合微通道经皮肾镜)治疗输尿管结石合并同侧肾结石的疗效及安全性。方法2018年9月~2019年9月,对32例输尿管结石合并同侧肾结石行一期双镜联合手术,斜仰卧截石位,同时置入F6/7.5输尿管镜和F... 目的探讨斜仰卧截石位一期双镜联合(输尿管硬镜联合微通道经皮肾镜)治疗输尿管结石合并同侧肾结石的疗效及安全性。方法2018年9月~2019年9月,对32例输尿管结石合并同侧肾结石行一期双镜联合手术,斜仰卧截石位,同时置入F6/7.5输尿管镜和F8/9.8经皮肾镜行钬激光或气压弹道碎石。结果手术均成功完成,无大出血、气胸、结肠损伤、感染性休克等并发症。手术时间(58.5±12.8)min,术后血红蛋白下降(17.5±10.3)g/L,术后住院时间(4.0±0.8)d。术后2个月输尿管结石清石率100%(32/32),肾结石清石率93.8%(30/32)。结论斜仰卧截石位使用输尿管镜联合微通道经皮肾镜一期治疗输尿管结石合并同侧肾结石安全有效,术中无需变换体位,适合缺少输尿管软镜的医疗单位应用。 展开更多
关键词 斜仰卧截石位 输尿管结石 肾结石 输尿管镜碎石术 微通道经皮肾镜碎石取石术
下载PDF
IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE 被引量:4
2
作者 Wan Zhongmei lai xuejia +2 位作者 Weng Jian Liu Shengli Hong Xuan 《Journal of Electronics(China)》 2009年第6期853-858,共6页
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche... In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates. 展开更多
关键词 KEY-INSULATED Proxy signature Identity-based signature Key-exposure Bilinear pairings
下载PDF
高频超声检查急性闭合性阴茎海绵体破裂1例
3
作者 张立忠 赖学佳 《医学影像学杂志》 2020年第1期90-90,95,共2页
患者男性,32岁。3h前粗暴弯折阴茎时听到“啪啦”的清脆响声,即出现阴茎剧烈疼痛,同时伴有阴茎渐进性肿胀,排尿稍痛。体格检查:阴茎松软,肿胀明显,呈S型伴广泛青紫,阴茎头偏向健侧,阴茎触痛明显(图1)。高频超声检查示:阴茎皮下软组织水... 患者男性,32岁。3h前粗暴弯折阴茎时听到“啪啦”的清脆响声,即出现阴茎剧烈疼痛,同时伴有阴茎渐进性肿胀,排尿稍痛。体格检查:阴茎松软,肿胀明显,呈S型伴广泛青紫,阴茎头偏向健侧,阴茎触痛明显(图1)。高频超声检查示:阴茎皮下软组织水肿增厚明显,右侧阴茎海绵体根部白膜高回声连续性中断,范围约9mm×6mm,周边见不均回声包块(图2)。 展开更多
关键词 闭合性阴茎海绵体破裂 超声检查
下载PDF
New field of cryptography: DNA cryptography 被引量:17
4
作者 XIAO Guozhen LU Mingxin +1 位作者 QIN Lei lai xuejia 《Chinese Science Bulletin》 SCIE EI CAS 2006年第12期1413-1420,共8页
DNA cryptography is a new born cryp- tographic field emerged with the research of DNA computing, in which DNA is used as information car- rier and the modern biological technology is used as implementation tool. The v... DNA cryptography is a new born cryp- tographic field emerged with the research of DNA computing, in which DNA is used as information car- rier and the modern biological technology is used as implementation tool. The vast parallelism and ex- traordinary information density inherent in DNA molecules are explored for cryptographic purposes such as encryption, authentication, signature, and so on. In this paper, we briefly introduce the biological background of DNA cryptography and the principle of DNA computing, summarize the progress of DNA cryptographic research and several key problems, discuss the trend of DNA cryptography, and compare the status, security and application fields of DNA cryptography with those of traditional cryptography and quantum cryptography. It is pointed out that all the three kinds of cryptography have their own ad- vantages and disadvantages and complement each other in future practical application. The current main difficulties of DNA cryptography are the absence of effective secure theory and simple realizable method. The main goal of the research of DNA cryptography is exploring characteristics of DNA molecule and reac- tion, establishing corresponding theories, discovering possible development directions, searching for sim- ple methods of realizing DNA cryptography, and lay- ing the basis for future development. 展开更多
关键词 密码术 DNA计算 DNA密码 信息载体 生物技术
原文传递
Improved zero-sum distinguisher for full round Keccak-f permutation 被引量:8
5
作者 DUAN Ming lai xuejia 《Chinese Science Bulletin》 SCIE CAS 2012年第6期694-697,共4页
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition,and its inner primitive is a permutation called Keccak-f.In this paper,we observe that for the inverse of the only nonline... Keccak is one of the five hash functions selected for the final round of the SHA-3 competition,and its inner primitive is a permutation called Keccak-f.In this paper,we observe that for the inverse of the only nonlinear transformation in Keccak-f,the algebraic degree of any output coordinate and the one of the product of any two output coordinates are both 3,which is 2 less than its size of 5.Combining this observation with a proposition on the upper bound of the degree of iterated permutations,we improve the zero-sum distinguisher for the Keccak-f permutation with full 24 rounds by lowering the size of the zero-sum partition from 21590 to 21575. 展开更多
关键词 置换 非线性变换 哈希函数 坐标 输出 排列 迭代
原文传递
Symmetric-key cryptosystem with DNA technology 被引量:14
6
作者 LU MingXin lai xuejia +1 位作者 XIAO GuoZhen QIN Lei 《Science in China(Series F)》 2007年第3期324-333,共10页
DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into crypto... DNA cryptography is a new field which has emerged with progress in the research of DNA computing. In our study, a symmetric-key cryptosystem was designed by applying a modern DNA biotechnology, microarray, into cryptographic technologies. This is referred to as DNA symmetric-key cryptosystem (DNASC). In DNASC, both encryption and decryption keys are formed by DNA probes, while its ciphertext is embedded in a specially designed DNA chip (microarray). The security of this system is mainly rooted in difficult biology processes and problems, rather than conventional computing technology, thus it is unaffected by changes from the attack of the coming quantum computer. The encryption process is a fabrication of a specially designed DNA chip and the decryption process is the DNA hybridization. In DNASC, billions of DNA probes are hybridized and identified at the same time, thus the decryption process is conducted in a massive, parallel way. The great potential in vast parallelism computation and the extraordinary information density of DNA are displayed in DNASC to some degree. 展开更多
关键词 symmetric-key encryption DNA cryptography DNA computing
原文传递
免白膜缝合两点固定法治疗小儿隐匿性阴茎(附38例报道) 被引量:5
7
作者 赖学佳 孙志军 方立 《中华整形外科杂志》 CAS CSCD 北大核心 2018年第8期598-601,共4页
目的探讨在免白膜缝合两点固定法治疗小儿隐匿性阴茎的可行性与适用性。方法2017年6~8月收治38例隐匿性阴茎患儿,年龄4~13岁,平均8.5岁。患儿均行手术治疗,术中在阴茎2点及10点位置将阴茎根部皮肤真皮层固定于相对应的腹股沟韧带... 目的探讨在免白膜缝合两点固定法治疗小儿隐匿性阴茎的可行性与适用性。方法2017年6~8月收治38例隐匿性阴茎患儿,年龄4~13岁,平均8.5岁。患儿均行手术治疗,术中在阴茎2点及10点位置将阴茎根部皮肤真皮层固定于相对应的腹股沟韧带内侧脚上,术中不行阴茎白膜固定。结果患儿手术结束2~6h后均能自行排尿,术后疼痛数字评分法评分1~3分,5~7d拆除纱布,切口均一期愈合,阴茎伸直良好,包皮自然翻起,阴茎头外露。所有病例术后阴茎显露长度较术前平均增加3cm。其中术后发生切口水肿3例,在术后5~7d均消退;术后未发生切口出血、阴茎偏曲等并发症。结论免白膜缝合两点固定法治疗小儿隐匿性阴茎效果显著,操作简单,是一种治疗隐匿性阴茎的较好术式。 展开更多
关键词 隐匿阴茎 阴茎延长术 免白膜缝合
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部