Results 101 to 110 of about 4,491,165 (327)
Security of discrete log cryptosystems in the random oracle and the generic model [PDF]
We introduce novel security proofs that use combinatorial counting arguments rather than reductions to the discrete logarithm or to the Diffie-Hellman problem. Our security results are sharp and clean with no polynomial reduction times involved.
Jakobsson, Markus, Schnorr, Claus Peter
core
Enhancing Study Design and Analysis of MR Imaging Markers Through Measurement Error Modeling
ABSTRACT Background Measurement error in imaging reduces statistical power and potentially biases parameter estimation, compromising study reliability. Purpose To introduce a dual data collection design (reliability and main datasets) to quantify measurement error and apply regression calibration to correct error‐prone imaging markers, thereby ...
Xiaofeng Wang +8 more
wiley +1 more source
Von Neumann Entropy Penalization and Low Rank Matrix Estimation [PDF]
A problem of statistical estimation of a Hermitian nonnegatively definite matrix of unit trace (for instance, a density matrix in quantum state tomography) is studied.
Koltchinskii, Vladimir
core +1 more source
ABSTRACT Engineers design the technical systems that define and sustain our society. The decision‐making scenarios they face require both quantitative analyses and the consideration of qualitative factors, which are shaped by deeply held beliefs, values, and societal contexts. However, existing engineering decision‐making models, primarily derived from
Scott Ferguson +1 more
wiley +1 more source
AUGURAL TERRITORIES: On the Prophetic Organizing of the Mid‐range
Abstract In this article I introduce the concept of augural territories to theorize the urbanism that emerged during pandemic lockdowns. I draw on ethnographic research in Madrid to examine how community‐based responses—including mutual aid networks, food pantries and neighbourhood associations—disrupted the spatial and temporal logics of territorial ...
Alberto Corsín Jiménez
wiley +1 more source
Leveled Certificateless Fully Homomorphic Encryption Schemes From Learning With Errors
Fully homomorphic encryption (FHE) is a form of public-key encryption that allows the computation of arbitrary functions on encrypted data without decrypting the data. As a result, it is a useful tool with numerous applications.
Mingxiang Li
doaj +1 more source
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M. +4 more
core +1 more source
Abstract This study collects original data to examine the determinants of classification criteria of county hierarchy and its rank variations during the Tang–Song period. The results reveal that the county hierarchy was affected by both economic and political situations, with more emphasis on politics in Tang and economics in Song.
Nan Li, Heqi Cai
wiley +1 more source
Provable data possession scheme with authentication
To satisfy the requirements of identity authentication and data possession proven in the cloud application scenarios,a provable data possession scheme with authentication was proposed.Based on data tag signature and randomness reusing,the proposed scheme
Hao-xing LI +3 more
doaj
On Obfuscation with Random Oracles [PDF]
Assuming trapdoor permutations, we show that there exist function families that cannot be VBB-obfuscated even if both the obfuscator and the obfuscated program have access to a random oracle. Specifically, these families are the robust unobfuscatable families of [Bitansky-Paneth, STOC 13].
Ran Canetti +2 more
openaire +1 more source

