A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications
[chapter]
2000
Lecture Notes in Computer Science
The best known constructions for arrays with low bias are those from 1] and the exponential sum method based on the Weil-Carlitz-Uchiyama bound. They all yield essentially the same parameters. ...
The applications comprise universal hashing, authentication, resilient functions and pseudorandomness. ...
The link between almost independent arrays and ( ; t)?ASU codes has been established in 16] (and is almost obvious): Theorem 12. A t-wise ? dependent array is ( ; t)?ASU, where = (p ?t + )=(p ?(t? ...
doi:10.1007/3-540-44598-6_33
fatcat:au55ksl3dvdcxmdjojsizyzhei
Page 7002 of Mathematical Reviews Vol. , Issue 2002I
[page]
2002
Mathematical Reviews
Dénes (Budapest)
2002i:94035 94A60 94827 Bierbrauer, Jiirgen (1-MITU; Houghton, MI); Schellwat, Holger Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. ...
They construct infinite families of PQA and almost PQA over Z, x Z, (“two-dimensional”) and provide recur- sive constructions using polynomial ring arithmetic. ...
Page 2294 of Mathematical Reviews Vol. , Issue 2002C
[page]
2002
Mathematical Reviews
Boolean func-
INFORMATION AND COMMUNICATION, CIRCUITS 2294
tions (515-532); Jiirgen Bierbrauer and Holger Schellwat, Almost independent and weakly biased arrays: efficient constructions and cryptologic ...
applications (533-543). ...
Page 2775 of Mathematical Reviews Vol. , Issue Subject Index
[page]
Mathematical Reviews
(English summary) 2002i:14027
Bierbrauer, Jiirgen (with Schellwat, Holger) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. ...
(English summary) 2002i:94035
— (with Schellwat, Holger) Weakly biased arrays, almost independent arrays and error- correcting codes. ...
Page 176 of Mathematical Reviews Vol. , Issue Author Index
[page]
Mathematical Reviews
(Alain Plagne) 2002c:11132 11P70 (11B75, 20K01)
Bierbrauer, Jirgen (with Schellwat, Holger) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. ...
(Giorgio Faina) 2002a:51016 S1E22 (S1E20)
— (with Schellwat, Holger) Weakly biased arrays, almost independent arrays and error-correcting codes. ...
Page 1754 of Mathematical Reviews Vol. , Issue Author Index
[page]
Mathematical Reviews
AUTHOR INDEX
2002
Schellwat, Holger (with Bierbrauer, Jirgen) Almost independent and weakly biased arrays: efficient constructions and cryptologic applications. ...
(Summary) 2002i:94035 94A60 (94B27)
— (with Bierbrauer, Jiirgen) Weakly biased arrays, almost independent arrays and error-correcting codes. ...
Nonstandard Finite Difference Schemes
2018
Notices of the American Mathematical Society
Dedè and C. Vergara from Politecnico di Milano, and A. Manzoni from EPFL are gratefully acknowledged.
Mathematical Modeling, Analysis and Applications in ...
help identify highly biased maps. ...
, leading to the theory of continued fractions, the efficient rational approximation of real numbers, and Minkowski's theorem on convex bodies; straight-edge and compass constructions, giving complete ...
doi:10.1090/noti1617
fatcat:nzhfdj7fsncndnhfiaegkizvue
Quantum cryptography
[chapter]
2006
Progress in optics
Cryptography and cryptanalysis, the art of codebreaking, together constitute cryptology (λóγoς, a word). ...
Also, the atmosphere is not birefringent at these wavelengths and is only weakly dispersive. ...
doi:10.1016/s0079-6638(06)49005-3
fatcat:pbj6ii5xqneohjvko76y3mznoa
Broadband Quantum Cryptography
2010
Synthesis Lectures on Quantum Computing
maintaining security at both the theoretical and practical level. ...
Overall, quantum cryptography has a place in the history of secret keeping as a novel and potentially useful paradigm shift in the approach to broadband data encryption. ...
The system, shown in Figure 6 .2, consists of arrays of heralded photon sources, where multiple independent weak coherent sources simultaneously generate their own pairs of photons at longer wavelengths ...
doi:10.2200/s00265ed1v01y201004qmc003
fatcat:yuckpbh74rgldlzs5woolytggy
From Information Theory Puzzles in Deletion Channels to Deniability in Quantum Cryptography
[article]
2020
arXiv
pre-print
Finally, we present an efficient coercion-resistant and quantum-secure voting scheme, based on fully homomorphic encryption. ...
We then establish a connection between covert communication and deniability to propose DC-QKE, a simple and provably secure construction for coercer-deniable QKE. ...
Wilde and Ignatius William Primaatmaja for their comments.
Further Applications of Covert Communication for Deniability ...
arXiv:2003.11663v1
fatcat:7ul4q6mupjcyzfyspus6xwh2ai
Isotopetronics - new direction of nanoscience
[article]
2010
arXiv
pre-print
The development of efficient quantum algorithms for classically hard problems has generated interest in the construction of a quantum computer. ...
The experiments in papers [67] also indicate that separation of the n 2 and n 1 excitons is isotope mass independent, implying, according these authors, the excitonic binding energy is independent on ...
arXiv:1007.5386v1
fatcat:dl26aus5h5dxbiefsonm6hetse
Analysis of lightweight stream ciphers
2008
We efficiently determine the immunity of existing and newly constructed Boolean functions against fast algebraic attacks. ...
As an application, a key recovery attack on simplified versions of eSTREAM candidates Trivium and Grain-128 is given. ...
The correlations weakly depend on the setup, and strongly depend on the filter. ...
doi:10.5075/epfl-thesis-4040
fatcat:q6x5qdgrxbdf3k4lngro7atlsm
Symmetric Cryptography (Dagstuhl Seminar 12031) Learning in Multiobjective Optimization (Dagstuhl Seminar 12041) Analysis of Executables: Benefits and Challenges (Dagstuhl Seminar 12051)
2012
Foundations for Scripting Languages
unpublished
Acknowledgments Many thanks to the Dagstuhl office and its helpful and patient staff; huge thanks to the organizers of the previous seminars in the series for setting us up for success; and thanks to all ...
the participants, who worked hard and were amiable company all week. ...
The speakers addressed how mutating malware could be classified (Roberto Giacobazzi) and how to treat memory allocated from a static array as independent heap cells (Xavier Rival). ...
fatcat:avothr4qzfbxlbs2hgjdkccu2i
A study of quantum circuits based on semiconductor structures
2019
Moreover, noise simulation is extended and adjusted on a quantum dot model based on semiconductor materials. ...
A software simulation tool under the title name QuCirDET is developed to easily design quantum circuits and simulate quantum recovery protocols. ...
In such a model, a qualified qubit undergoes a Pauli error independently, neglecting biased
correlations between X and Z errors. ...
doi:10.26262/heal.auth.ir.305867
fatcat:ppzjimfmyrfe3gftqgzgja4r5i
Book Reviews Vol V No2, full text
1995
The Northern Mariner
weakly escorted convoys merely invited destruction. ...
When the WRNS was re-introduced at the outbreak of World War II, it was these social connections which enabled the service to re-organize quickly, efficiently and independently despite little support from ...
submarine with a towed array can detect ships and other submarines in an area almost two and a half times as large as Nova Scotia or four times the size of Vancouver Island, or that a frigate like HMCS ...
doi:10.25071/2561-5467.742
fatcat:uaukyieaangynnnr2lkedhvjna
« Previous
Showing results 1 — 15 out of 21 results