• No results found

[PDF] Top 20 Compact lossy and all-but-one trapdoor functions from lattice

Has 10000 "Compact lossy and all-but-one trapdoor functions from lattice" found on our website. Below are the top 20 most common "Compact lossy and all-but-one trapdoor functions from lattice".

Compact lossy and all-but-one trapdoor functions from lattice

Compact lossy and all-but-one trapdoor functions from lattice

... Let the parameters n, p, q, g, r, α be chosen as above. Compared to the LWE-based LTDF and ABO- TDF proposed in [8], our compact LTDF and ABO- TDF constructions reduce both the size of public key (i.e.the function ... See full document

13

Hierarchical  Identity-Based (Lossy)  Trapdoor  Functions

Hierarchical Identity-Based (Lossy) Trapdoor Functions

... of trapdoor functions which does not rely on lattices: realizing such a hierarchy using traditional number theoretic tech- niques was identified as an open problem by Cash et ... See full document

39

Short  Signatures  With  Short  Public  Keys  From  Homomorphic  Trapdoor  Functions

Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions

... Existential unforgeability under adaptive chosen-message attack (eu-acma security) is defined in a similar manner. The difference is that under this notion, A receives the verification key vk before making any queries, ... See full document

18

Non-Malleable  Functions   and  Their  Applications

Non-Malleable Functions and Their Applications

... and one-wayness in ...implies one-wayness for poly-to-one functions but not vise ...adaptive one-wayness (AOW) for injective ...and one-wayness for functions, which extend ... See full document

35

Calculating Radar Cross Section of Lossy Targets Using the Surface Impedance Approach

Calculating Radar Cross Section of Lossy Targets Using the Surface Impedance Approach

... basis functions are not adequate for the approximation of the currents at the lossy strip ...a lossy conducting strip as a function of the observation angle for different strip ...slightly from ... See full document

12

Design of novel High Secure Image Encoding using  V.L.S.I.

Design of novel High Secure Image Encoding using V.L.S.I.

... This new and advanced proposed system tells us the about the transformation of the image from one device to another device. Suppose I want to send a color image from Tx to Rx, then I have to consume ... See full document

5

Spectral functions from lattice QCD at finite temperature

Spectral functions from lattice QCD at finite temperature

... in lattice calculations of the equation of state or the de­ confinement transition tem perature due to the fine control of the tem perature af­ forded by the continuous adjustm ent of the lattice spacing ... See full document

133

All for One and One Delivery Room Approach for All?

All for One and One Delivery Room Approach for All?

... to all the quadruplets when facing delivery so ...of all of their 4 fetuses, optimizing the chances of survival and survival without morbidity to the extent that medical care ...for all the ... See full document

7

On Lindelöf lattices and separation

On Lindelöf lattices and separation

... LindelSf lattice, 0-1 valued measures, disjunctive lattice, countably compact, normal lattice, prime complete, premeasure, delta lattice, replete, regular, slightly normal, I-lattice.. 1[r] ... See full document

5

Practical all to all propagators for lattice QCD

Practical all to all propagators for lattice QCD

... signal from the ...the all-to-all propagator utilising the idea of low-mode dominance corrected by a stochastic estimator which yields the exact all-to-all propagator in a finite number ... See full document

24

Homomorphisms of Function Lattices

Homomorphisms of Function Lattices

... functions (respectively, lattice functions) isomorphic translation lattices of point functions (lattice functions) w hich generate the topology (generate the Boolean al[r] ... See full document

173

Compact Lossy Inductance Simulators With Electronic Control

Compact Lossy Inductance Simulators With Electronic Control

... N inductor is a very useful passive element which finds very frequent applications in circuits and electrical engineering. The working of conventional spiral inductors is not matched with the ideal behavior. The ... See full document

9

Realcompactification and repleteness of Wallman spaces

Realcompactification and repleteness of Wallman spaces

... The extension of bounded lattice continuous functions on an arbitrary set x to the regular zero-one measures on an algebra generated by a lattice a Wallman-type space.. set of lattice.[r] ... See full document

12

A  New  Trapdoor  over  Module-NTRU  Lattice   and  its  Application  to  ID-based  Encryption

A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption

... makes one almost freely chooses the modulus q, and hence we cannot expect global improvement for this ...MNTRU trapdoor increases the public key size. Still, one may ... See full document

22

Regular  Lossy  Functions   and  Their  Applications  in  Leakage-Resilient  Cryptography

Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography

... In the DDH-based ABO-LTF construction [PW08], the input space is restricted to {0, 1} n and m must be larger than n to ensure invertible property. In our construction, we do not require invertible property. Therefore, ... See full document

37

Anisotropic discretisations and practical all to all propagators for lattice QCD

Anisotropic discretisations and practical all to all propagators for lattice QCD

... an all-to-all propagator method demands, and can be extracted with reasonable accuracy using a point-to-all ...a lattice unit of momentum in each spatial direction (p = ^ ( 1 ,1 ,1 ) ) ... See full document

128

Multipliers and differential operators

Multipliers and differential operators

... A,µ has a compact support In the latter case Convolution defined thus is associative provided that all but at most one of the factors has a compact support or that all are bounded measur[r] ... See full document

106

A  Decade  of  Lattice  Cryptography

A Decade of Lattice Cryptography

... Constructions of versatile and powerful cryptographic objects. Historically, cryptography was mainly about sending secret messages. Yet over the past few decades, the field has blossomed into a discipline having much ... See full document

90

Compact Rectenna Design for Lossy Paper Substrate at 2.45 GHz

Compact Rectenna Design for Lossy Paper Substrate at 2.45 GHz

... To demonstrate the operation of the entire system, the measurement of the whole rectenna is performed. Figure 9 shows the fabricated rectenna. The rectenna is 45 mm long and 60 mm wide. Figure 9 describes the measurement ... See full document

10

Building  Lossy  Trapdoor  Functions  from  Lossy  Encryption

Building Lossy Trapdoor Functions from Lossy Encryption

... While lossy trapdoor functions were created as a building block for IND-CCA secure encryption, lossy encryption was initially created to help prove security against an active adversary in the ... See full document

16

Show all 10000 documents...