نتایج جستجو برای: cryptology
تعداد نتایج: 644 فیلتر نتایج به سال:
This survey covers some security aspects of cooperative frequent itemset mining. We observe scenarios, where individual records of the database are distributed among different parties. All parties are willing to cooperate in order to find globally frequent itemsets, but they do not want to reveal too much information. The survey examines one possible solution proposed in article [KC02], but an ...
We propose novel vehicle detection and classification methods based on images from visible light and thermal cameras. These methods can be used in real-time smart surveillance systems. To classify vehicles by type, we extract the headlight and grill areas from the visible light and thermal images. We then extract texture characteristics from the images and use these as features for classifying ...
Why use Magic for teaching cryptology and algorithmic notions through thanks to Scilab/Matlab programs? During a magic performance, the audience will seek understand how trick works once surprise has worn off. So teacher can that in order interest their students, lead them ask does it work? After discovering secret, students could want create one themselves . I had idea shuffles explain basis o...
So far, all the differential attacks on MD5 were constructed through multi-block collision method. Can collisions for MD5 be found using just a single block of message (i.e. 512-bit)? This has been an open problem since the first 2-block collision attack was given. However, a paper titled “How To Find Weak Input Differences For MD5 Collision Attacks” (Cryptology ePrint Archive (2009/223), http:...
Scenes Vocabulary The abstract scenes interface developed by Antol et al. [1] consists of 20 “deformable” humans, 31 animals in different poses, and about 100 objects that can be found in indoor scenes (e.g., couch, picture, doll, door, window, plant, fireplace) or outdoor scenes (e.g., tree, pond, sun, clouds, bench, bike, campfire, grill, skateboard). In addition to the 8 different expression...
We revisit the question of constructing an ideal cipher from a random oracle. Coron et al. (Journal of Cryptology, 2014) proved that a 14-round Feistel network using random, independent, keyed round functions is indifferentiable from an ideal cipher, thus demonstrating the feasibility of such a construction. Left unresolved is the best possible efficiency of the transformation. We improve upon ...
Model Based Investigation of Virtual Electrodes of the Multi-Electrode Array for Epiretinal Prostheses by Jerel Mueller Department of Biomedical Engineering Duke University Date:_______________________ Approved: ___________________________ Warren Grill, Supervisor ___________________________ Craig Henriquez ___________________________ Patrick Wolf An abstract of a thesis submitted in partial fu...
Shortly following Cheon, Han, Lee, Ryu and Stehlé’s attack against the multilinear map of Coron, Lepoint and Tibouchi (CLT), two independent approaches to thwart this attack have been proposed on the cryptology ePrint archive, due to Garg, Gentry, Halevi and Zhandry on the one hand, and Boneh, Wu and Zimmerman on the other. In this short note, we show that both countermeasures can be defeated i...
“Thermal Referral (TR)” and “Thermal Grill Illusion (TGI)” are known as illusions of thermal sensation, have been well studied. In a previous study, the experiment using two thermal-tactile stimulations to the forearm revealed that those illusions simultaneously occurred. On the other hand, in the experiment result, a few subjects perceived a hot stimulation as a cold sensation or a cold stimul...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید