Results 101 to 110 of about 105,934 (253)

Correcting Subverted Random Oracles

open access: yes
The random oracle methodology has proven to be a powerful tool for designing and reasoning about cryptographic schemes. In this paper, we focus on the basic problem of correcting faulty or adversarially corrupted random oracles, so that they can be confidently applied for such cryptographic purposes. We prove that a simple construction can transform a
Russell, Alexander   +4 more
openaire   +2 more sources

Streebog as a random oracle

open access: yesPrikladnaya Diskretnaya Matematika
The random oracle model is an instrument used for proving that protocol has no structural flaws when settling with standard hash properties is impossible or fairly difficult. In practice, however, random oracles must be instantiated with some specific hash functions that are not random oracles.
Akhmetzyanova, L. R.   +2 more
openaire   +1 more source

Short Signatures Without Random Oracles [PDF]

open access: yes, 2004
We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumption we call the Strong Diffie-Hellman assumption. This assumption has similar properties to the Strong RSA assumption, hence the name. Strong RSA was previously
Dan Boneh, Xavier Boyen
openaire   +1 more source

Medical Knowledge Integration Into Reinforcement Learning Algorithms for Dynamic Treatment Regimes

open access: yesInternational Statistical Review, EarlyView.
Summary The goal of precision medicine is to provide individualised treatment at each stage of chronic diseases, a concept formalised by dynamic treatment regimes (DTR). These regimes adapt treatment strategies based on decision rules learned from clinical data to enhance therapeutic effectiveness.
Sophia Yazzourh   +3 more
wiley   +1 more source

How Do People Conceptualize Narcissism and Narcissistic Individuals?

open access: yesJournal of Personality, EarlyView.
ABSTRACT Introduction Although past decades have seen notable advances in the conceptualization and assessment of narcissism, scholarship examining lay conceptualizations of the construct remains limited. Method We report two studies utilizing bottom‐up, participant‐driven methodologies to examine public understandings of narcissism and narcissistic ...
Sarah Smith   +2 more
wiley   +1 more source

Multi-User Security Bound for Mixed Filter Permutators in the Random Oracle Model

open access: yesIACR Transactions on Symmetric Cryptology
At Eurocrypt’16, Méaux et al. designed a construction for symmetric ciphers that can be efficiently evaluated with Fully Homomorphic Encryption, dubbed Filter Permutator. They also specify FLIP, a family of Filter Permutators.
Benoît Cogliati, Simon Demarty
doaj   +1 more source

Tests for Changes in Count Time Series Models With Exogenous Covariates

open access: yesJournal of Time Series Analysis, EarlyView.
ABSTRACT We deal with a parametric change in models for count time series with exogenous covariates specified via the conditional distribution, i.e., with integer generalized autoregressive conditional heteroscedastic models with covariates (INGARCH‐X).
Šárka Hudecová, Marie Hušková
wiley   +1 more source

Band‐Pass Filtering With High‐Dimensional Time Series. A Synthetic Indicator of the Medium‐to‐Long Run Component of Growth

open access: yesJournal of Time Series Analysis, EarlyView.
ABSTRACT The paper deals with the construction of a synthetic indicator of economic growth, obtained by projecting a quarterly measure of aggregate economic activity, namely gross domestic product (GDP), into the space spanned by a finite number of smooth principal components, representative of the medium‐to‐long‐run component of economic growth of a ...
Alessandro Giovannelli   +2 more
wiley   +1 more source

Faster Convex Optimization: Simulated Annealing with an Efficient Universal Barrier

open access: yes, 2015
This paper explores a surprising equivalence between two seemingly-distinct convex optimization methods. We show that simulated annealing, a well-studied random walk algorithms, is directly equivalent, in a certain sense, to the central path interior ...
Abernethy, Jacob, Hazan, Elad
core  

Becoming Dostoevsky (how Rowan Williams opens up Bakhtin)

open access: yesModern Theology, EarlyView.
Abstract With the end of Communism in Russia, non‐materialist contexts were enthusiastically restored to Mikhail Bakhtin's globally famous ideas of carnival, dialogism, and polyphony. This essay surveys Rowan Williams's 2008 study Dostoevsky: Language, Faith + Fiction as a major contribution to this effort, concentrating on those general philosophical ...
Caryl Emerson
wiley   +1 more source

Home - About - Disclaimer - Privacy