نتایج جستجو برای: rotary agitated extractors

تعداد نتایج: 13559  

Journal: :Journal of the Society of Powder Technology, Japan 1987

Journal: :Des. Codes Cryptography 2008
Reza Rezaeian Farashahi Ruud Pellikaan Andrey Sidorenko

A deterministic extractor for an elliptic curve is a function that converts a random point on the curve to a random-looking bit-string, which is statistically close to a uniformly random bit-string. The problem of converting random points of an elliptic curve into random bits has several cryptographic applications. In this talk, we propose two simple and efficient deterministic extractors for a...

Journal: :IACR Cryptology ePrint Archive 2014
Benjamin Fuller Leonid Reyzin Adam D. Smith

Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy secret into the same uniformly distributed key. A minimum condition for the security of the key is the hardness of guessing a value that is similar to the secret, because the fuzzy extractor converts such a guess to the key. We define fuzzy min-entropy to quantify this property of a noisy source of...

Journal: :Annals of emergency medicine 1995
S B Karch C V Wetli

To the Editor." The recent article by Stratton et al [May 1995;25:710-712] describes two violent and combative patients who were placed, prone, in hobble restraints and died while being transported and monitored by paramedical personnel. The authors are to be commended for bringing this problem to the attention of emergency physicians. Unfortunately, they appear to have confused agitated deliri...

2014
Yundi Qian William B. Haskell Albert Xin Jiang Milind Tambe

Protecting our environment and natural resources is a major global challenge. “Protectors” (law enforcement agencies) try to protect these natural resources, while “extractors” (criminals) seek to exploit them. In many domains, such as illegal fishing, the extractors know more about the distribution and richness of the resources than the protectors, making it extremely difficult for the protect...

2007
Reza Rezaeian Farashahi

We propose two simple and efficient deterministic extractors for J(Fq), the Jacobian of a genus 2 hyperelliptic curve H defined over Fq, for some odd q. Our first extractor, SEJ, called sum extractor, for a given point D on J(Fq), outputs the sum of abscissas of rational points on H in the support of D, considering D as a reduced divisor. Similarly the second extractor, PEJ, called product extr...

2014
Ran Raz Omer Reingold Salil Vadhan

We present a general method to reduce the error of any extractor. Our method works particularly well in the case that the original extractor extracts up to a constant fraction of the source min-entropy and achieves a polynomially small error. In that case, we are able to reduce the error to (almost) any ε, using only O(log(1/ε)) additional truly random bits (while keeping the other parameters o...

Journal: :Inf. Process. Lett. 2002
Amnon Ta-Shma

We deal with the problem of storing a set of K elements that are taken from a large universe of size N , such that membership in the set can be determined with high probability by looking at just one bit of the representation. Buhrman et al. show an explicit construction with about K2 logN storing bits. We show an explicit construction with about K1+o(1) storing bits, that gets closer to the op...

1999
Ran Raz Omer Reingold Salil P. Vadhan

We present a general method to reduce the error of any extractor. Our method works particularly well in the case that the original extractor extracts up to a constant fraction of the source min-entropy and achieves a polynomially small error. In that case, we are able to reduce the error to (almost) any ", using only O(log(1=")) additional truly random bits (while keeping the other parameters o...

2009

Fuzzy extractors are used to generate reliably reproducible randomness from a biased, noisy source. Known constructions of fuzzy extractors are built from a strong extractor, and a secure sketch, a function that transforms a biased noisy secret value into a public value, simultaneously hiding the secret and allowing for error correction. A robust sketch is secure against adversarial modificatio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید