军事学 >>> 军事学
搜索结果: 1-10 共查到军事学 capacity相关记录10条 . 查询时间(0.187 秒)
Noisy channels are a valuable resource from a cryptographic point of view. They can be used for exchanging secret-keys as well as realizing other cryptographic primitives such as commitment and oblivi...
We draw a new connection between Coppersmith's method for finding small solutions to polynomial congruences modulo integers and the capacity theory of adelic subsets of algebraic curves. Coppersmith's...
We provide new bounds for the pseudo-random function security of keyed sponge constructions. For the case c ≤ b/2 (c the capacity and b the permutation size), our result improves over all previously...
Multidimensional linear attacks are one of the most powerful variants of linear cryptanalytic techniques now. However, there is no knowledge on the key-dependent capacity and data complexity so far....
Noisy channels are a powerful resource for cryptography as they can be used to obtain information-theoretically secure key agreement, commitment and oblivious transfer protocols, among others. Obliv...
We study the asymptotic-capacity-achieving score function that was recently proposed by Oosterwijk et al. for bias-based traitor tracing codes. For the bias function we choose the Dirichlet distributi...
Capacity of Non-Malleable Codes     Information Theory  Tamper-Resilient Cryptography       font style='font-size:12px;'> 2014/3/10
Non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs (ICS 2010), encode messages $s$ in a manner so that tampering the codeword causes the decoder to either output $s$ or a message that ...
Information-theoretically secure string oblivious transfer (OT) can be constructed based on discrete memoryless channel (DMC). The oblivious transfer capacity of a channel characterizes – similarly ...
In extension of the bit commitment task and following work initiated by Crépeau and Kilian, we introduce and solve the problem of character- ising the optimal rate at which a discrete memoryless cha...
In this paper, we formulate the requirements for privacy pro- tecting biometric authentication systems. The secrecy capacity Cs is in- vestigated for the discrete and the continuous case. We present...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...