نتایج جستجو برای: cryptology

تعداد نتایج: 644  

2004
Sven Laur

This survey covers some security aspects of cooperative frequent itemset mining. We observe scenarios, where individual records of the database are distributed among different parties. All parties are willing to cooperate in order to find globally frequent itemsets, but they do not want to reveal too much information. The survey examines one possible solution proposed in article [KC02], but an ...

Journal: :EURASIP J. Image and Video Processing 2018
Yunyoung Nam Yun-Cheol Nam

We propose novel vehicle detection and classification methods based on images from visible light and thermal cameras. These methods can be used in real-time smart surveillance systems. To classify vehicles by type, we extract the headlight and grill areas from the visible light and thermal images. We then extract texture characteristics from the images and use these as features for classifying ...

Journal: :Japan journal of research 2023

Why use Magic for teaching cryptology and algorithmic notions through thanks to Scilab/Matlab programs? During a magic performance, the audience will seek understand how trick works once surprise has worn off. So teacher can that in order interest their students, lead them ask does it work? After discovering secret, students could want create one themselves . I had idea shuffles explain basis o...

Journal: :IACR Cryptology ePrint Archive 2010
Tao Xie Dengguo Feng

So far, all the differential attacks on MD5 were constructed through multi-block collision method. Can collisions for MD5 be found using just a single block of message (i.e. 512-bit)? This has been an open problem since the first 2-block collision attack was given. However, a paper titled “How To Find Weak Input Differences For MD5 Collision Attacks” (Cryptology ePrint Archive (2009/223), http:...

2016

Scenes Vocabulary The abstract scenes interface developed by Antol et al. [1] consists of 20 “deformable” humans, 31 animals in different poses, and about 100 objects that can be found in indoor scenes (e.g., couch, picture, doll, door, window, plant, fireplace) or outdoor scenes (e.g., tree, pond, sun, clouds, bench, bike, campfire, grill, skateboard). In addition to the 8 different expression...

Journal: :IACR Cryptology ePrint Archive 2015
Dana Dachman-Soled Jonathan Katz Aishwarya Thiruvengadam

We revisit the question of constructing an ideal cipher from a random oracle. Coron et al. (Journal of Cryptology, 2014) proved that a 14-round Feistel network using random, independent, keyed round functions is indifferentiable from an ideal cipher, thus demonstrating the feasibility of such a construction. Left unresolved is the best possible efficiency of the transformation. We improve upon ...

2010
Jerel Mueller Craig Henriquez Patrick Wolf

Model Based Investigation of Virtual Electrodes of the Multi-Electrode Array for Epiretinal Prostheses by Jerel Mueller Department of Biomedical Engineering Duke University Date:_______________________ Approved: ___________________________ Warren Grill, Supervisor ___________________________ Craig Henriquez ___________________________ Patrick Wolf An abstract of a thesis submitted in partial fu...

Journal: :IACR Cryptology ePrint Archive 2014
Jean-Sébastien Coron Tancrède Lepoint Mehdi Tibouchi

Shortly following Cheon, Han, Lee, Ryu and Stehlé’s attack against the multilinear map of Coron, Lepoint and Tibouchi (CLT), two independent approaches to thwart this attack have been proposed on the cryptology ePrint archive, due to Garg, Gentry, Halevi and Zhandry on the one hand, and Boneh, Wu and Zimmerman on the other. In this short note, we show that both countermeasures can be defeated i...

2017
Keisuke Arai Satoshi Hashiguchi

“Thermal Referral (TR)” and “Thermal Grill Illusion (TGI)” are known as illusions of thermal sensation, have been well studied. In a previous study, the experiment using two thermal-tactile stimulations to the forearm revealed that those illusions simultaneously occurred. On the other hand, in the experiment result, a few subjects perceived a hot stimulation as a cold sensation or a cold stimul...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید