A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
The best known constructions for arrays with low bias are those from 1] and the exponential sum method based on the Weil-Carlitz-Uchiyama bound. They all yield essentially the same parameters. ... The applications comprise universal hashing, authentication, resilient functions and pseudorandomness. ... The link between almost independent arrays and ( ; t)?ASU codes has been established in 16] (and is almost obvious): Theorem 12. A t-wise ? dependent array is ( ; t)?ASU, where = (p ?t + )=(p ?(t? ...doi:10.1007/3-540-44598-6_33 fatcat:au55ksl3dvdcxmdjojsizyzhei
Dénes (Budapest) 2002i:94035 94A60 94827 Bierbrauer, Jiirgen (1-MITU; Houghton, MI); Schellwat, Holger Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. ... They construct infinite families of PQA and almost PQA over Z, x Z, (“two-dimensional”) and provide recur- sive constructions using polynomial ring arithmetic. ...
Boolean func- INFORMATION AND COMMUNICATION, CIRCUITS 2294 tions (515-532); Jiirgen Bierbrauer and Holger Schellwat, Almost independent and weakly biased arrays: efficient constructions and cryptologic ... applications (533-543). ...
(English summary) 2002i:14027 Bierbrauer, Jiirgen (with Schellwat, Holger) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. ... (English summary) 2002i:94035 — (with Schellwat, Holger) Weakly biased arrays, almost independent arrays and error- correcting codes. ...
(Alain Plagne) 2002c:11132 11P70 (11B75, 20K01) Bierbrauer, Jirgen (with Schellwat, Holger) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. ... (Giorgio Faina) 2002a:51016 S1E22 (S1E20) — (with Schellwat, Holger) Weakly biased arrays, almost independent arrays and error-correcting codes. ...
AUTHOR INDEX 2002 Schellwat, Holger (with Bierbrauer, Jirgen) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. ... (Summary) 2002i:94035 94A60 (94B27) — (with Bierbrauer, Jiirgen) Weakly biased arrays, almost independent arrays and error-correcting codes. ...
Dedè and C. Vergara from Politecnico di Milano, and A. Manzoni from EPFL are gratefully acknowledged. Mathematical Modeling, Analysis and Applications in ... help identify highly biased maps. ... , leading to the theory of continued fractions, the efficient rational approximation of real numbers, and Minkowski's theorem on convex bodies; straight-edge and compass constructions, giving complete ...doi:10.1090/noti1617 fatcat:nzhfdj7fsncndnhfiaegkizvue
Progress in optics
Cryptography and cryptanalysis, the art of codebreaking, together constitute cryptology (λóγoς, a word). ... Also, the atmosphere is not birefringent at these wavelengths and is only weakly dispersive. ...doi:10.1016/s0079-6638(06)49005-3 fatcat:pbj6ii5xqneohjvko76y3mznoa
maintaining security at both the theoretical and practical level. ... Overall, quantum cryptography has a place in the history of secret keeping as a novel and potentially useful paradigm shift in the approach to broadband data encryption. ... The system, shown in Figure 6 .2, consists of arrays of heralded photon sources, where multiple independent weak coherent sources simultaneously generate their own pairs of photons at longer wavelengths ...doi:10.2200/s00265ed1v01y201004qmc003 fatcat:yuckpbh74rgldlzs5woolytggy
Finally, we present an efficient coercion-resistant and quantum-secure voting scheme, based on fully homomorphic encryption. ... We then establish a connection between covert communication and deniability to propose DC-QKE, a simple and provably secure construction for coercer-deniable QKE. ... Wilde and Ignatius William Primaatmaja for their comments. Further Applications of Covert Communication for Deniability ...arXiv:2003.11663v1 fatcat:7ul4q6mupjcyzfyspus6xwh2ai
The development of efficient quantum algorithms for classically hard problems has generated interest in the construction of a quantum computer. ... The experiments in papers  also indicate that separation of the n 2 and n 1 excitons is isotope mass independent, implying, according these authors, the excitonic binding energy is independent on ...arXiv:1007.5386v1 fatcat:dl26aus5h5dxbiefsonm6hetse
We efficiently determine the immunity of existing and newly constructed Boolean functions against fast algebraic attacks. ... As an application, a key recovery attack on simplified versions of eSTREAM candidates Trivium and Grain-128 is given. ... The correlations weakly depend on the setup, and strongly depend on the filter. ...doi:10.5075/epfl-thesis-4040 fatcat:q6x5qdgrxbdf3k4lngro7atlsm
Foundations for Scripting Languages
Acknowledgments Many thanks to the Dagstuhl office and its helpful and patient staff; huge thanks to the organizers of the previous seminars in the series for setting us up for success; and thanks to all ... the participants, who worked hard and were amiable company all week. ... The speakers addressed how mutating malware could be classified (Roberto Giacobazzi) and how to treat memory allocated from a static array as independent heap cells (Xavier Rival). ...fatcat:avothr4qzfbxlbs2hgjdkccu2i
Moreover, noise simulation is extended and adjusted on a quantum dot model based on semiconductor materials. ... A software simulation tool under the title name QuCirDET is developed to easily design quantum circuits and simulate quantum recovery protocols. ... In such a model, a qualified qubit undergoes a Pauli error independently, neglecting biased correlations between X and Z errors. ...doi:10.26262/heal.auth.ir.305867 fatcat:ppzjimfmyrfe3gftqgzgja4r5i
The Northern Mariner
weakly escorted convoys merely invited destruction. ... When the WRNS was re-introduced at the outbreak of World War II, it was these social connections which enabled the service to re-organize quickly, efficiently and independently despite little support from ... submarine with a towed array can detect ships and other submarines in an area almost two and a half times as large as Nova Scotia or four times the size of Vancouver Island, or that a frigate like HMCS ...doi:10.25071/2561-5467.742 fatcat:uaukyieaangynnnr2lkedhvjna
« Previous Showing results 1 — 15 out of 21 results