• No results found

[PDF] Top 20 Lossy Trapdoor Permutations with Improved Lossiness

Has 10000 "Lossy Trapdoor Permutations with Improved Lossiness" found on our website. Below are the top 20 most common "Lossy Trapdoor Permutations with Improved Lossiness".

Lossy  Trapdoor  Permutations  with  Improved  Lossiness

Lossy Trapdoor Permutations with Improved Lossiness

... large lossiness factor ...the lossiness factor cannot be made arbitrarily large and, in particular, it is not sufficient to con- struct efficient ... See full document

25

Building  Lossy  Trapdoor  Functions  from  Lossy  Encryption

Building Lossy Trapdoor Functions from Lossy Encryption

... The lossiness of this cryptosystem was further developed and explored in [PVW08] where Peikert, Vaikun- tanathan and Waters defined Dual-Mode Encryption, as a means of constructing efficient and composable ... See full document

16

Compact lossy and all-but-one trapdoor functions from lattice

Compact lossy and all-but-one trapdoor functions from lattice

... of lossy trapdoor functions (LTDF) was proposed by Peikert and Waters at STOC 2008 [8], which can be viewed as a strictly stronger powerful primitive than ...of lossy trapdoor functions ... See full document

13

Hierarchical  Identity-Based (Lossy)  Trapdoor  Functions

Hierarchical Identity-Based (Lossy) Trapdoor Functions

... a trapdoor function is one-wayness, which means that the function is hard to invert without the suitable secret ...Partial lossiness for identity-based trapdoor functions was introduced in [9], where ... See full document

39

On  the  Regularity  of  Lossy  RSA:  Improved  Bounds   and  Applications  to  Padding-Based  Encryption

On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption

... Lossy trapdoor functions, defined by [22], are one of many concepts that allow us to deploy information-theoretic tools to analyze computationally-secure ...protocols. Lossiness is mostly used in the ... See full document

19

More  Efficient  Cryptosystems  From $k^{th}$-Power  Residues

More Efficient Cryptosystems From $k^{th}$-Power Residues

... Lossy Trapdoor Functions (LTDFs), introduced by Peikert and Waters at STOC’08 [29], have been proven to be an extremely useful and versatile cryptographic primitive ...large lossiness based on their ... See full document

22

An Energy-efficient and Real-time Anonymous Routing Protocol for Ad hoc Networks

An Energy-efficient and Real-time Anonymous Routing Protocol for Ad hoc Networks

... Our Zero Knowledge Proofs of Trapdoor Protocol (ZKPTP) is a variant of the Feige-Fiat-Shamir Identification Protocol[11], which is a perfect application of Zero Knowledge Proofs. Like in the Feige-Fiat-Shamir ... See full document

13

Lossy kernelization

Lossy kernelization

... a lossy pre-processing can simultaneously achieve a better size bound than normal kernelization algorithms as well as a better approximation factor than the ratio of the best approximation algorithms is not ...of ... See full document

15

A REVIEW ON THE TECHNIQUES DEPLOYED IN DATA COMPRESSION

A REVIEW ON THE TECHNIQUES DEPLOYED IN DATA COMPRESSION

... or lossy compression in which the total amount of data in the audio waveform is reduced to differing extents for storage or transmission ...[27-29]. Lossy audio compression bestows higher compression and is ... See full document

6

Centrifuge modelling of the ground reaction curve of fibre reinforced soil

Centrifuge modelling of the ground reaction curve of fibre reinforced soil

... to trapdoor displacements and the zone of soil above the trapdoor effectively dis- places downwards as a rigid ...the trapdoor effectively matching those of the trapdoor throughout the ...the ... See full document

7

Medical Image De-noising and Compression via a 2-D Wavelet Transform

Medical Image De-noising and Compression via a 2-D Wavelet Transform

... Wavelet –based algorithm is an efficient and cost-effective method that is applied to several sub fields of discrete wavelet transform such as Image Compression, Image De-noising, Image Enhancement, Image Recognition, ... See full document

8

Permutations sortable by n-4 passes through a stack

Permutations sortable by n-4 passes through a stack

... sortable permutations, that is, the polynomial whose k-th coefficient is the number of (n − 4)-stack sortable permutations with exactly k descents (a descent in π = a 1 a 2 ... See full document

6

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... the permutations of a given string under a given set of constraints is ...the permutations and then check which of them satisfy the given set of ...those permutations which satisfy the given set of ... See full document

16

Orderings on words and permutations

Orderings on words and permutations

... In this section we show it is decidable whether a given finitely-based set C of per- mutations is atomic. Our approach will be similar to that for the factor ordering on words, in that we will employ a graph G ( C ) ... See full document

170

Catenation of Permutations on Caterpillars

Catenation of Permutations on Caterpillars

... the permutations. Section III comprises of the results on permutations realising a path with even and odd number of elements Catenated with permutations realising ... See full document

5

chapter7_malware.pdf

chapter7_malware.pdf

...  Backdoor (trapdoor) – bypasses normal security check Backdoor (trapdoor) – bypasses normal security check  Mobile code – software that can be shipped over net Mobile code – software that can be shipped ... See full document

28

Profiles of Large Combinatorial Structures

Profiles of Large Combinatorial Structures

... of permutations with restricted cycle ...of permutations – for example, those in which all cycle lengths are even, which for large n have number of cycles nearly normally distributed with mean and variance ... See full document

265

Graph Derangements

Graph Derangements

... From the perspective of graph derangements it is clear that Hamiltonian cycles lie at the other extreme from dyadic derangements and permutations. Here much less is known than in the dyadic case: there is no known ... See full document

9

Quotients Derived from Posets in Algebraic and Topological Combinatorics.

Quotients Derived from Posets in Algebraic and Topological Combinatorics.

... avoiding permutations [26], inversion sequences [22], outerplanar maps [13], and preimages of pat- tern avoiding permutations under the classic stack sorting algorithm ...avoiding permutations ... See full document

103

On pattern avoiding indecomposable permutations

On pattern avoiding indecomposable permutations

... indecomposable permutations avoiding a classical pattern of length 3 or 4, and of indecomposable permutations avoiding a non-consecutive vincular pattern of length ...indecomposable permutations for ... See full document

24

Show all 10000 documents...