Results 71 to 80 of about 105,934 (253)

Security of discrete log cryptosystems in the random oracle and the generic model [PDF]

open access: yes, 1999
We introduce novel security proofs that use combinatorial counting arguments rather than reductions to the discrete logarithm or to the Diffie-Hellman problem. Our security results are sharp and clean with no polynomial reduction times involved.
Jakobsson, Markus, Schnorr, Claus Peter
core  

A Deep Learning Framework for Forecasting Medium‐Term Covariance in Multiasset Portfolios

open access: yesJournal of Forecasting, EarlyView.
ABSTRACT Forecasting the covariance matrix of asset returns is central to portfolio construction, risk management, and asset pricing. However, most existing models struggle at medium‐term horizons, several weeks to months, where shifting market regimes and slower dynamics prevail.
Pedro Reis, Ana Paula Serra, João Gama
wiley   +1 more source

Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [PDF]

open access: yesQuantum
Copy-protection allows a software distributor to encode a program in such a way that it can be evaluated on any input, yet it cannot be "pirated" – a notion that is impossible to achieve in a classical setting.
Andrea Coladangelo   +2 more
doaj   +1 more source

Universally Composable Verifiable Random Oracles

open access: yes, 2022
Random Oracles werden häufig in der Kryptographie eingesetzt um sehr effiziente Instanziierungen mächtiger kryptographischer Primitive zu konstruieren. Jedoch ist diese Praxis im Allgemeinen nicht zulässig wie verschiedene Nicht-Instanziierungs-Ergebnisse für Random Oracles mittels lokal berechenbarer Familien von Funktionen durch Halevi et al.
openaire   +3 more sources

Between Consistency and Adaptation: How Middle Managers Shape Compensation System Implementation

open access: yesHuman Resource Management, EarlyView.
ABSTRACT The success of a human resource management (HRM) system or subsystem, such as a compensation system, hinges on its implementation—yet the microfoundations of this process remain underexplored. To address this gap, we conducted two studies. Study 1 surveyed middle managers and employees in six organizations to examine their attributions of ...
Aino Tenhiälä   +3 more
wiley   +1 more source

On independent random oracles

open access: yesTheoretical Computer Science, 1992
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +1 more source

Revisiting EWMA in High‐Frequency‐Based Portfolio Optimization: A Comparative Assessment

open access: yesJournal of Applied Econometrics, EarlyView.
ABSTRACT This paper compares the statistical and economic performance of state‐of‐the‐art high‐frequency (HF) based multivariate volatility models with a simpler, widely used alternative, the Exponentially Weighted Moving Average (EWMA) filter. Using over two decades of 100 U.S.
Laura Capera Romero, Anne Opschoor
wiley   +1 more source

Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes

open access: yesIEEE Access, 2019
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong   +4 more
doaj   +1 more source

An average-case depth hierarchy theorem for Boolean circuits

open access: yes, 2015
We prove an average-case depth hierarchy theorem for Boolean circuits over the standard basis of $\mathsf{AND}$, $\mathsf{OR}$, and $\mathsf{NOT}$ gates.
Rossman, Benjamin   +2 more
core   +1 more source

Ramadan and the Iftar Meal: A Qualitative Exploration of Signs of Disordered Eating in Muslim Men and Women Living in the United Kingdom

open access: yesJournal of Clinical Psychology, EarlyView.
ABSTRACT Objective To qualitatively explore the lived experiences of fasting during Ramadan and the Iftar meal in Muslim adults with low self‐regulation (i.e., low ability to control) eating behavior. Methods Semistructured interviews were conducted with Muslim young adults, scoring below the threshold for low/moderate self‐regulation on the Self ...
Alina Zubair   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy