William Friedman, Geneticist Turned Cryptographer
نویسندگان
چکیده
منابع مشابه
Footprint Scheduling for Dining-Cryptographer Networks
In many communication scenarios it is not sufficient to protect only the content of the communication, it is necessary to also protect the identity of communicating parties. Various protocols and technologies have been proposed to offer such protection, for example, anonymous proxies, mix-networks, or onion routing. The protocol that offers the strongest anonymity guarantees, namely uncondition...
متن کاملRecent battle between quantum cryptographer and hacker
Xiongfeng Ma, ∗ Yang Liu, Yan-Lin Tang, Teng-Yun Chen, Hua-Lei Yin, Chi-Hang Fred Fung, Hai-Lin Yong, Liu-Jun Wang, Hao Liang, Guo-Liang Shentu, Jian Wang, Ke Cui, Li Li, Nai-Le Liu, Cheng-Zhi Peng, Zeng-Bing Chen, Qiang Zhang, and Jian-Wei Pan 3 Center for Quantum Information, Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing, China Shanghai Branch, Hefei Natio...
متن کاملImplementing the Friedman Rule
In cash-in-advance models, necessary and sufficient conditions for the existence of an equilibrium with zero nominal interest rates and Pareto optimal allocations place restrictions only on the very long-run, or asymptotic, behavior of the money supply. When these asymptotic conditions are satisfied, they leave the central bank with a great deal of flexibility to manage the money supply over an...
متن کاملThe Friedman Embedding Theorem
In this paper, we will present an explicit construction of Harvey Friedman which to every finitely generated group G associates a 2-generator subgroup KG 6 Sym(N) such that G embeds into KG and such that if G ∼= H, then KG = KH .
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Genetics
سال: 2017
ISSN: 1943-2631
DOI: 10.1534/genetics.117.201624