Results 71 to 80 of about 106,354 (248)
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments
As an extremely significant cryptographic primitive, certificateless signature (CLS) schemes can provide message authentication with no use of traditional digital certificates.
Bo Zhang +3 more
doaj +1 more source
Universally Composable Verifiable Random Oracles
Random Oracles werden häufig in der Kryptographie eingesetzt um sehr effiziente Instanziierungen mächtiger kryptographischer Primitive zu konstruieren. Jedoch ist diese Praxis im Allgemeinen nicht zulässig wie verschiedene Nicht-Instanziierungs-Ergebnisse für Random Oracles mittels lokal berechenbarer Familien von Funktionen durch Halevi et al.
openaire +3 more sources
Enhancing Study Design and Analysis of MR Imaging Markers Through Measurement Error Modeling
ABSTRACT Background Measurement error in imaging reduces statistical power and potentially biases parameter estimation, compromising study reliability. Purpose To introduce a dual data collection design (reliability and main datasets) to quantify measurement error and apply regression calibration to correct error‐prone imaging markers, thereby ...
Xiaofeng Wang +8 more
wiley +1 more source
Quantum copy-protection of compute-and-compare programs in the quantum random oracle model [PDF]
Copy-protection allows a software distributor to encode a program in such a way that it can be evaluated on any input, yet it cannot be "pirated" – a notion that is impossible to achieve in a classical setting.
Andrea Coladangelo +2 more
doaj +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +1 more source
Connecting the distribution and diversification of marine plants
Integration of the evolutionary history with distribution of extant species is necessary to explain present‐day diversity, particularly for ‘foundation' species, such as seagrasses, which create habitats of socioecological relevance. Here, we resolved if varying evolutionary history of seagrass families has imprinted the distribution ranges of extant ...
Fernando Tuya +3 more
wiley +1 more source
Finding Minimum‐Cost Explanations for Predictions Made by Tree Ensembles
ABSTRACT The ability to reliably explain why a machine learning model arrives at a particular prediction is crucial when used as decision support by human operators of critical systems. The provided explanations must be provably correct, and preferably without redundant information, called minimal explanations.
John Törnblom +2 more
wiley +1 more source
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A new transpositional padding encryption scheme is proposed, with which we construct a universal scheme, namely, a ...
Linming Gong +4 more
doaj +1 more source
A Resource Efficient Ising Model‐Based Quantum Sudoku Solver
ABSTRACT Background Quantum algorithms exploit superposition and parallelism to address complex combinatorial problems, many of which fall into the non‐polynomial (NP) class. Sudoku, a widely known logic‐based puzzle, is proven to be NP‐complete and thus presents a suitable testbed for exploring quantum optimization approaches.
Wen‐Li Wang +5 more
wiley +1 more source
A New Cryptosystem Based On Hidden Order Groups [PDF]
Let $G_1$ be a cyclic multiplicative group of order $n$. It is known that the Diffie-Hellman problem is random self-reducible in $G_1$ with respect to a fixed generator $g$ if $\phi(n)$ is known. That is, given $g, g^x\in G_1$ and having oracle access to
Saxena, Amitabh, Soh, Ben
core +2 more sources

