• No results found

one-way permutation

On  Constructing  One-Way  Permutations  from  Indistinguishability  Obfuscation

On Constructing One-Way Permutations from Indistinguishability Obfuscation

... of one-way permutations in the foundations of cryptography, only very few candidates have been suggested over the ...Whereas one-way functions can be based on an extremely wide variety of ...

36

Limits  on  the  Power  of  Indistinguishability  Obfuscation   and  Functional  Encryption

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption

... exponentially-secure one-way permutation (and even a trapdoor permu- tation family), (2) there exists an exponentially-secure general-purpose obfuscator for oracle-aided circuits, and (3) there does ...

63

Algebraic (Trapdoor)  One  Way  Functions   and  their  Applications

Algebraic (Trapdoor) One Way Functions and their Applications

... trapdoor one way permutations, directly allow for a very simple and elegant extension of Full Domain Hash (FDH) to the case of linearly homomorphic ...efficient way and based on simple assumptions ...

39

Garbled  RAM  From  One-Way  Functions

Garbled RAM From One-Way Functions

... UMA-secure one and show how to extend it to full ...same one is used for each GInput, whereas s out is an evolving key that is initially equal to s and is updated by ...

32

One-Way  Functions   and (Im)perfect  Obfuscation

One-Way Functions and (Im)perfect Obfuscation

... A program obfuscator takes a program and outputs a “scrambled” version of it, where the goal is that the obfuscated program will not reveal much about its structure beyond what is apparent from executing it. There are ...

26

The permutation classes Av(1234,2341) and Av(1243,2314)

The permutation classes Av(1234,2341) and Av(1243,2314)

... We build the Hasse graph of a permutation by starting with a source graph and then repeatedly adding another source graph to the lower right. The technique is sim- ilar to that of “adding a slice”, which has been ...

18

One Way to Design a Valence Skip Compound

One Way to Design a Valence Skip Compound

... that Δ is rather insensitive to V and one might think it is impossible to collapse the gap by pressure. However, the optimized z is different for each V and we show the V - dependence of Δ with optimizing z in the ...

5

Beyond the one-way ANOVA for 'omics data

Beyond the one-way ANOVA for 'omics data

... term has a potentially different multiplicity adjustment. However, one can in- vestigate each term independently. Comparing the significance of each term to MRF and RFM for a single simulated dataset (Figure 6B), ...

13

Beyond the one-way ANOVA for 'omics data

Beyond the one-way ANOVA for 'omics data

... the one-way test of the saturated model, whereas the MRF approach overcomes this conservativeness through an inflation of the residual degrees of free- dom due to a one-way test of the ...

20

The One-Way Communication Complexity of Hamming Distance

The One-Way Communication Complexity of Hamming Distance

... Abstract: Consider the following version of the Hamming distance problem for ±1 vec- tors of length n: the promise is that the distance is either at least n 2 + √ n or at most n 2 − √ n, and the goal is to find out which ...

7

One-way buckling analysis of pipeline liners

One-way buckling analysis of pipeline liners

... general one-way buckling theory and the results were extremely close to those from the corresponding experimental ...the one-way buckling analysis of rings contained within a circular ...

362

A Preliminary Investigation into the Mediating Role of Positive Affect in the Development of Posttraumatic Stress Disorder among African American Female Sexual Assault Survivors

A Preliminary Investigation into the Mediating Role of Positive Affect in the Development of Posttraumatic Stress Disorder among African American Female Sexual Assault Survivors

... and permutation polynomials are described in this ...Frobenius permutation which played an important ...Frobenius permutation. We generalize it to a permutation called a monomial ...

51

Heteroskedasticity in One-Way Error Component Probit Models

Heteroskedasticity in One-Way Error Component Probit Models

... The aim of this paper is to introduce an estimation procedure that accounts for this heteroskedasticity using the Gauss-Hermite quadrature scheme 1 . In addition, the papers aims at providing a likelihood ratio (LR) test ...

22

New Chaotic Substation and Permutation Method for Image Encryption

New Chaotic Substation and Permutation Method for Image Encryption

... New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block ...

6

Limitations of Quantum Advice and One-Way Communication

Limitations of Quantum Advice and One-Way Communication

... dim (H) is at least halved; the observation that dim (H) must be at least 1 by the end then implies that T ≤ K = O( p (n) log p (n)), meaning that the advice is of polynomial size. The huge improvement from EXP to PP ...

28

Beyond the one-way ANOVA for 'omics data

Beyond the one-way ANOVA for 'omics data

... the one- way test of the saturated model, whereas the MRF approach overcomes this conservativeness through an inflation of the residual degrees of freedom due to a one- way test of the ...

19

Some Pointers on One Way ANOVA in SPSS

Some Pointers on One Way ANOVA in SPSS

... Sir R. A. Fisher (1935) clearly explained the relationship among the mean, the variance, and the normal distribution: "The normal distribution has only two characteristics, its mean and its variance. The mean ...

6

On  the  Existence  of  Extractable  One-Way  Functions

On the Existence of Extractable One-Way Functions

... An additional potential problem is that a malicious verifier may output an element y ˜ outside of the function’s image, an event which in general may not be efficiently recognizable, and cause the simulator to fail. This ...

42

Hamiltonians for one-way quantum repeaters

Hamiltonians for one-way quantum repeaters

... If we perform the six-states protocol [6, 18] with this state, we can compute the key rate by following the results in appendix A of [31]. We resort to the six- state protocol because the distortion causes errors, and ...

8

6 Probability and one-way tables

6 Probability and one-way tables

... In Year 11, you saw how frequency tables can be used for statistical purposes. We can also use frequency tables to calculate relative frequencies. When used in this way, the resulting tables are sometimes called ...

26

Show all 10000 documents...

Related subjects