搜索结果: 1-15 共查到“Biased”相关记录62条 . 查询时间(0.094 秒)
Securely Sampling Biased Coins with Applications to Differential Privacy
distributed differential privacy secure computation
font style='font-size:12px;'>
2019/7/17
We design an efficient method for sampling a large batch of dd independent coins with a given bias p∈[0,1]p∈[0,1]. The folklore secure computation method for doing so requires O(λ+logd)O(λ+logd...
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies
Hidden number problem ECDSA Lattices
font style='font-size:12px;'>
2019/1/10
In this paper, we compute hundreds of Bitcoin private keys and dozens of Ethereum, Ripple, SSH, and HTTPS private keys by carrying out cryptanalytic attacks against digital signatures contained in pub...
The Social Psychology of Biased Self-Assessment
Social Psychology Biased Self-Assessment
font style='font-size:12px;'>
2018/11/22
Objective: To describe the psychological mechanisms that underlie biased self-assessment and suggest pedagogical techniques to counter them.
Findings: Since the psychological mechanisms that underlie...
Controlled-NOT function can provoke biased interpretation from Bell's test experiments
cryptografic protocol cnot gate Bell test
font style='font-size:12px;'>
2017/7/19
Recently, we showed that the controlled-NOT function is a permutation that cannot be inverted in subexponential time in the worst case [Quantum Information Processing. 16:149 (2017)]. Here, we show th...
Old Rocks,Biased Data:Overcoming Challenges Studying the Geodynamo
Old Rocks Biased Data Overcoming Challenges Studying Geodynamo
font style='font-size:12px;'>
2017/3/13
Gleaning data from old rocks may result in bias. Now, geophysicists have a way to improve their methods to overcome challenges in studying the history of the Earth's core and magnetic field that make ...
NON LINEAR OPTIMIZATION APPLIED TO ANGLE-OF-ARRIVAL SATELLITE BASED GEO-LOCALIZATION FOR BIASED AND TIME-DRIFTING SENSORS
Angle of Arrival Line of Sight Non-Linear Optimization
font style='font-size:12px;'>
2016/7/8
Multiple sensors are used in a variety of geolocation systems. Many use Time Difference of Arrival (TDOA) or Received Signal Strength (RSS) measurements to estimate the most likely location of a signa...
Decoy-state quantum key distribution with biased basis choice
Decoy-state quantum distribution biased basis choice
font style='font-size:12px;'>
2016/1/23
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many...
Entanglement-based quantum key distribution with biased basis choice via free space
Entanglement-based quantum key distribution iased basis choice via free space
font style='font-size:12px;'>
2016/1/23
We report a free-space entanglement-based quantum key dis-tribution experiment, implementing the biased basis protocol between two sites which are 15.3 km apart. Photon pairs from a polarization-entan...
Secure Key Generation from Biased PUFs
implementation PUFs key generation
font style='font-size:12px;'>
2015/12/29
PUF-based key generators have been widely considered as a
root-of-trust in digital systems. They typically require an error-correcting
mechanism (e.g. based on the code-offset method) for dealing wi...
Analyzing the Efficiency of Biased-Fault Based Attacks
Differential Attack Fault Intensity Biased Fault
font style='font-size:12px;'>
2015/12/29
The traditional fault analysis techniques developed over the
past decade rely on a fault model, a rigid assumption about the nature of
the fault. A practical challenge for all faults attacks is to i...
Using State Space Encoding To Counter Biased Fault Attacks on AES Countermeasures
Cryptanalysis Time Redundancy Biased Faults
font style='font-size:12px;'>
2015/12/24
Biased fault attacks such as the Differential Fault
Intensity Analysis (DFIA) have been a major threat to cryptosystems
in recent times. DFIA combines principles of side
channel analysis and fault ...
The DOP Estimation Method Is Biased and Inconsistent
DOP Estimation Method Biased Inconsistent
font style='font-size:12px;'>
2015/8/27
A data-oriented parsing or DOP model for statistical parsing associates fragments of linguistic representations with numerical weights, where these weights are estimated by normalizing the empirical f...
Reconciling Predictive Coding and Biased Competition Models of Cortical Function
neural networks cortical circuits cortical feedback biased competition predictive coding
font style='font-size:12px;'>
2015/7/29
A simple variation of the standard biased competition model is shown, via some trivial mathematical manipulations, to be identical to predictive coding. Specifically, it is shown that a particular imp...
Predictive Coding as a Model of Biased Competition in Visual Attention
neural networks cortical circuits cortical feedback attention binding problem
font style='font-size:12px;'>
2015/7/29
Attention acts, through cortical feedback pathways, to enhance the response of cells encoding expected or predicted information. Such observations are inconsistent with the predictive coding theory of...
Riffle shuffles with biased cuts
card shuffl ing biased cuts quasisymmetric functions
font style='font-size:12px;'>
2015/7/7
The well-known Gilbert-Shannon-Reeds model for riffle shuffles assumes that the cards are initially cut‘about in half’ and then riffled together. We analyze a natural variant where t...