Results 51 to 60 of about 172 (89)

Precise Undersampling Theorems

open access: yesProceedings of the IEEE, 2010
D. Donoho, Jared Tanner
semanticscholar   +1 more source

Cryptographycal protocols in the Egerfood Information System [PDF]

open access: yes
In this article we present the cryptography of the food safety tracking sys- tem of the Regional Knowledge Center (EGERFOOD), which can be found in Eger, Hungary at the Eszterházy Károly College.
Kusper, Gábor   +2 more
core  

Analysing and exploiting the Mantin biases in RC4. [PDF]

open access: yesDes Codes Cryptogr, 2018
Bricout R   +3 more
europepmc   +1 more source

Using General Large Language Models to Classify Mathematical Documents

open access: yes
In this article we report on an initial exploration to assess the viability of using the general large language models (LLMs), recently made public, to classify mathematical documents. Automated classification would be useful from the applied perspective
Ion, Patrick D. F., Watt, Stephen M.
core  

Optimal s-boxes against alternative operations

open access: yes
Civino et al. have characterised diffusion layers that expose an SPN to vulnerability from differential cryptanalysis when employing alternative operations coming from groups isomorphic to the translation group on the message space.
Calderini, Marco   +2 more
core  

Instantiating the Hash-then-evaluate paradigm: Strengthening PRFs, PCFs, and OPRFs. [PDF]

open access: yesCryptogr Commun
Brzuska C   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy