Results 111 to 120 of about 94,999 (279)
Analysis of DSTU 8961:2019 in the quantum random oracle model
Serhii Kandii, І.Д. Горбенко
openalex +2 more sources
Evolutionary legacies structure the geography of seagrass traits across the world's oceans
Summary Traits modulate species' ability to track shifts in climate, yet the extent to which traits have been shaped by the contemporary environment and/or historical processes remains poorly understood. Here, we fill this gap for the world's seagrasses, habitat‐forming species that provide critical ecosystem services.
Nestor E. Bosch +2 more
wiley +1 more source
Practical Lattice-Based Multisignature Schemes for Blockchains
Compact multisignature is vital for shrinking the signature size of decentralized blockchain. All practical compact multisignature schemes have been constructed from the discrete logarithm problem which is potentially vulnerable to quantum computing ...
Changshe Ma, Mei Jiang
doaj +1 more source
On Statistical Query Sampling and NMR Quantum Computing
We introduce a ``Statistical Query Sampling'' model, in which the goal of an algorithm is to produce an element in a hidden set $Ssubseteqbit^n$ with reasonable probability.
Blum, Avrim, Yang, Ke
core +1 more source
ABSTRACT Digital technologies change the nature of product and service development and challenge established firms to adapt to the new digital environment. As small and medium‐sized enterprises (SMEs), in particular, lack the resources necessary to digitally transform their business, they are forced to find new strategies to stay competitive in a ...
Christian Schröder +3 more
wiley +1 more source
Variable selection via thresholding
Abstract Variable selection comprises an important step in many modern statistical inference procedures. In the regression setting, when estimators cannot shrink irrelevant signals to zero, covariates without relationships to the response often manifest small but nonzero regression coefficients.
Ka Long Keith Ho, Hien Duy Nguyen
wiley +1 more source
A Machine-Checked Formalization of the Random Oracle Model [PDF]
Most approaches to the formal analysis of cryptography protocols make the perfect cryptographic assumption, which entails for example that there is no way to obtain knowledge about the plaintext pertaining to a ciphertext without knowing the key. Ideally, one would prefer to abandon the perfect cryptography hypothesis and reason about the computational
Gilles Barthe, Sabrina Tarento
openaire +1 more source
Faster Convex Optimization: Simulated Annealing with an Efficient Universal Barrier
This paper explores a surprising equivalence between two seemingly-distinct convex optimization methods. We show that simulated annealing, a well-studied random walk algorithms, is directly equivalent, in a certain sense, to the central path interior ...
Abernethy, Jacob, Hazan, Elad
core
(Co‐)Reference All the Way Down: A Unified Theory of (Pro) Nominals in Ordinary English
ABSTRACT This essay joins two themes, both arising from Kripke's inspiring ideas in the theory of reference. The first theme concerns reference in general. The second examines the notion of co‐reference and the role it plays in a unified theory of pronouns for natural language.
Jessica Pepp, Joseph Almog
wiley +1 more source
A Novel Identity-Based Signcryption Scheme in the Standard Model
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure in a
Yueying Huang, Junjie Yang
doaj +1 more source

