Filters








21 Hits in 5.9 sec

Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications [chapter]

Jürgen Bierbrauer, Holger Schellwat
2000 Lecture Notes in Computer Science  
The best known constructions for arrays with low bias are those from 1] and the exponential sum method based on the Weil-Carlitz-Uchiyama bound. They all yield essentially the same parameters.  ...  The applications comprise universal hashing, authentication, resilient functions and pseudorandomness.  ...  The link between almost independent arrays and ( ; t)?ASU codes has been established in 16] (and is almost obvious): Theorem 12. A t-wise ? dependent array is ( ; t)?ASU, where = (p ?t + )=(p ?(t?  ... 
doi:10.1007/3-540-44598-6_33 fatcat:au55ksl3dvdcxmdjojsizyzhei

Page 7002 of Mathematical Reviews Vol. , Issue 2002I [page]

2002 Mathematical Reviews  
Dénes (Budapest) 2002i:94035 94A60 94827 Bierbrauer, Jiirgen (1-MITU; Houghton, MI); Schellwat, Holger Almost independent and weakly biased arrays: efficient constructions and cryptologic applications.  ...  They construct infinite families of PQA and almost PQA over Z, x Z, (“two-dimensional”) and provide recur- sive constructions using polynomial ring arithmetic.  ... 

Page 2294 of Mathematical Reviews Vol. , Issue 2002C [page]

2002 Mathematical Reviews  
Boolean func- INFORMATION AND COMMUNICATION, CIRCUITS 2294 tions (515-532); Jiirgen Bierbrauer and Holger Schellwat, Almost independent and weakly biased arrays: efficient constructions and cryptologic  ...  applications (533-543).  ... 

Page 2775 of Mathematical Reviews Vol. , Issue Subject Index [page]

Mathematical Reviews  
(English summary) 2002i:14027 Bierbrauer, Jiirgen (with Schellwat, Holger) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications.  ...  (English summary) 2002i:94035 — (with Schellwat, Holger) Weakly biased arrays, almost independent arrays and error- correcting codes.  ... 

Page 176 of Mathematical Reviews Vol. , Issue Author Index [page]

Mathematical Reviews  
(Alain Plagne) 2002c:11132 11P70 (11B75, 20K01) Bierbrauer, Jirgen (with Schellwat, Holger) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications.  ...  (Giorgio Faina) 2002a:51016 S1E22 (S1E20) — (with Schellwat, Holger) Weakly biased arrays, almost independent arrays and error-correcting codes.  ... 

Page 1754 of Mathematical Reviews Vol. , Issue Author Index [page]

Mathematical Reviews  
AUTHOR INDEX 2002 Schellwat, Holger (with Bierbrauer, Jirgen) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications.  ...  (Summary) 2002i:94035 94A60 (94B27) — (with Bierbrauer, Jiirgen) Weakly biased arrays, almost independent arrays and error-correcting codes.  ... 

Nonstandard Finite Difference Schemes

Ronald E. Mickens
2018 Notices of the American Mathematical Society  
Dedè and C. Vergara from Politecnico di Milano, and A. Manzoni from EPFL are gratefully acknowledged. Mathematical Modeling, Analysis and Applications in  ...  help identify highly biased maps.  ...  , leading to the theory of continued fractions, the efficient rational approximation of real numbers, and Minkowski's theorem on convex bodies; straight-edge and compass constructions, giving complete  ... 
doi:10.1090/noti1617 fatcat:nzhfdj7fsncndnhfiaegkizvue

Quantum cryptography [chapter]

Miloslav Dušek, Norbert Lütkenhaus, Martin Hendrych
2006 Progress in optics  
Cryptography and cryptanalysis, the art of codebreaking, together constitute cryptology (λóγoς, a word).  ...  Also, the atmosphere is not birefringent at these wavelengths and is only weakly dispersive.  ... 
doi:10.1016/s0079-6638(06)49005-3 fatcat:pbj6ii5xqneohjvko76y3mznoa

Broadband Quantum Cryptography

Daniel J. Rogers
2010 Synthesis Lectures on Quantum Computing  
maintaining security at both the theoretical and practical level.  ...  Overall, quantum cryptography has a place in the history of secret keeping as a novel and potentially useful paradigm shift in the approach to broadband data encryption.  ...  The system, shown in Figure 6 .2, consists of arrays of heralded photon sources, where multiple independent weak coherent sources simultaneously generate their own pairs of photons at longer wavelengths  ... 
doi:10.2200/s00265ed1v01y201004qmc003 fatcat:yuckpbh74rgldlzs5woolytggy

From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography [article]

Arash Atashpendar
2020 arXiv   pre-print
Finally, we present an efficient coercion-resistant and quantum-secure voting scheme, based on fully homomorphic encryption.  ...  We then establish a connection between covert communication and deniability to propose DC-QKE, a simple and provably secure construction for coercer-deniable QKE.  ...  Wilde and Ignatius William Primaatmaja for their comments. Further Applications of Covert Communication for Deniability  ... 
arXiv:2003.11663v1 fatcat:7ul4q6mupjcyzfyspus6xwh2ai

Isotopetronics - new direction of nanoscience [article]

Vladimir G. Plekhanov
2010 arXiv   pre-print
The development of efficient quantum algorithms for classically hard problems has generated interest in the construction of a quantum computer.  ...  The experiments in papers [67] also indicate that separation of the n 2 and n 1 excitons is isotope mass independent, implying, according these authors, the excitonic binding energy is independent on  ... 
arXiv:1007.5386v1 fatcat:dl26aus5h5dxbiefsonm6hetse

Analysis of lightweight stream ciphers

Simon Fischer
2008
We efficiently determine the immunity of existing and newly constructed Boolean functions against fast algebraic attacks.  ...  As an application, a key recovery attack on simplified versions of eSTREAM candidates Trivium and Grain-128 is given.  ...  The correlations weakly depend on the setup, and strongly depend on the filter.  ... 
doi:10.5075/epfl-thesis-4040 fatcat:q6x5qdgrxbdf3k4lngro7atlsm

Symmetric Cryptography (Dagstuhl Seminar 12031) Learning in Multiobjective Optimization (Dagstuhl Seminar 12041) Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)

Robert Hirschfeld, Shriram Krishnamurthi, Jan, Verónica Becher, Laurent Bienvenu, Rodney Downey, Elvira Mayordomo, Frederik Armknecht, Stefan Lucks, Bart Preneel, Phillip Rogaway, Salvatore Greco (+6 others)
2012 Foundations for Scripting Languages   unpublished
Acknowledgments Many thanks to the Dagstuhl office and its helpful and patient staff; huge thanks to the organizers of the previous seminars in the series for setting us up for success; and thanks to all  ...  the participants, who worked hard and were amiable company all week.  ...  The speakers addressed how mutating malware could be classified (Roberto Giacobazzi) and how to treat memory allocated from a static array as independent heap cells (Xavier Rival).  ... 
fatcat:avothr4qzfbxlbs2hgjdkccu2i

A study of quantum circuits based on semiconductor structures

Κωνστνατίνος Ε. Προύσαλης
2019
Moreover, noise simulation is extended and adjusted on a quantum dot model based on semiconductor materials.  ...  A software simulation tool under the title name QuCirDET is developed to easily design quantum circuits and simulate quantum recovery protocols.  ...  In such a model, a qualified qubit undergoes a Pauli error independently, neglecting biased correlations between X and Z errors.  ... 
doi:10.26262/heal.auth.ir.305867 fatcat:ppzjimfmyrfe3gftqgzgja4r5i

Book Reviews Vol V No2, full text

Contributing Authors
1995 The Northern Mariner  
weakly escorted convoys merely invited destruction.  ...  When the WRNS was re-introduced at the outbreak of World War II, it was these social connections which enabled the service to re-organize quickly, efficiently and independently despite little support from  ...  submarine with a towed array can detect ships and other submarines in an area almost two and a half times as large as Nova Scotia or four times the size of Vancouver Island, or that a frigate like HMCS  ... 
doi:10.25071/2561-5467.742 fatcat:uaukyieaangynnnr2lkedhvjna
« Previous Showing results 1 — 15 out of 21 results