Results 71 to 80 of about 105,934 (253)
Security of discrete log cryptosystems in the random oracle and the generic model [PDF]
We introduce novel security proofs that use combinatorial counting arguments rather than reductions to the discrete logarithm or to the Diffie-Hellman problem. Our security results are sharp and clean with no polynomial reduction times involved.
Jakobsson, Markus, Schnorr, Claus Peter
core
A Deep Learning Framework for Forecasting Medium‐Term Covariance in Multiasset Portfolios
ABSTRACT Forecasting the covariance matrix of asset returns is central to portfolio construction, risk management, and asset pricing. However, most existing models struggle at medium‐term horizons, several weeks to months, where shifting market regimes and slower dynamics prevail.
Pedro Reis, Ana Paula Serra, João Gama
wiley +1 more source
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [PDF]
Copy-protection allows a software distributor to encode a program in such a way that it can be evaluated on any input, yet it cannot be "pirated" – a notion that is impossible to achieve in a classical setting.
Andrea Coladangelo +2 more
doaj +1 more source
Universally Composable Verifiable Random Oracles
Random Oracles werden häufig in der Kryptographie eingesetzt um sehr effiziente Instanziierungen mächtiger kryptographischer Primitive zu konstruieren. Jedoch ist diese Praxis im Allgemeinen nicht zulässig wie verschiedene Nicht-Instanziierungs-Ergebnisse für Random Oracles mittels lokal berechenbarer Familien von Funktionen durch Halevi et al.
openaire +3 more sources
Between Consistency and Adaptation: How Middle Managers Shape Compensation System Implementation
ABSTRACT The success of a human resource management (HRM) system or subsystem, such as a compensation system, hinges on its implementation—yet the microfoundations of this process remain underexplored. To address this gap, we conducted two studies. Study 1 surveyed middle managers and employees in six organizations to examine their attributions of ...
Aino Tenhiälä +3 more
wiley +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
Revisiting EWMA in High‐Frequency‐Based Portfolio Optimization: A Comparative Assessment
ABSTRACT This paper compares the statistical and economic performance of state‐of‐the‐art high‐frequency (HF) based multivariate volatility models with a simpler, widely used alternative, the Exponentially Weighted Moving Average (EWMA) filter. Using over two decades of 100 U.S.
Laura Capera Romero, Anne Opschoor
wiley +1 more source
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong +4 more
doaj +1 more source
An average-case depth hierarchy theorem for Boolean circuits
We prove an average-case depth hierarchy theorem for Boolean circuits over the standard basis of $\mathsf{AND}$, $\mathsf{OR}$, and $\mathsf{NOT}$ gates.
Rossman, Benjamin +2 more
core +1 more source
ABSTRACT Objective To qualitatively explore the lived experiences of fasting during Ramadan and the Iftar meal in Muslim adults with low self‐regulation (i.e., low ability to control) eating behavior. Methods Semistructured interviews were conducted with Muslim young adults, scoring below the threshold for low/moderate self‐regulation on the Self ...
Alina Zubair +3 more
wiley +1 more source

