نتایج جستجو برای: soxhlet extractor
تعداد نتایج: 4487 فیلتر نتایج به سال:
A Biometric fuzzy extractor scheme for iris templates was recently presented in [3]. This fuzzy extractor binds a cryptographic key with the iris template of a user, allowing to recover such cryptographic key by authenticating the user by means of a new iris template from her. In this work, an analysis of the security efficiency of this fuzzy extractor is carried out by means of a study about t...
We present a negative result of fuzzy extractors with computational security. Specifically, we show that, under a certain computational condition, the existence of a computational fuzzy extractor implies the existence of an information-theoretic fuzzy extractor with slightly weaker parameters. The condition is that the generation procedure of the fuzzy extractor is efficiently invertible by an ...
Extractor Description Language (EDL) vereinfacht die im Software-Reengineering immer wiederkehrende Überführung von Quellcode in abstrakte Syntaxgraphen (ASG). EDL verwendet einen GLR-Parser, der im Unterschied zu den üblichen LL/LR(k)Algorithmen die Verwendung von beliebigen, auch mehrdeutigen, kontextfreien Grammatiken erlaubt. Darüber hinaus vereinfachen Symboltabellen-Stacks und deklarative...
This lecture is about randomness extractors. Extractors are functions that map samples from a non-uniform distribution to samples that are close to being uniformly distributed. The length of the output will in general be smaller than the length of the input of the extractor. The input distribution of the extractor is called the source. A source is a random variable which maps text values to bit...
"'.his paper describes thc algorithms. implementation, and performance of a hierarchical circuit extractorfor NMOS designs. The input to the circuit extractor is a description of the layout of the chip. and its outputis a hierarchical wirelist describing the circuit. The extractor is divided into two parts, a front-end and aback-end. The front-end analyzes the CIF description of...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy secret into the same uniformly distributed key. A minimum condition for the security of the key is the hardness of guessing a value that is similar to the secret, because the fuzzy extractor converts such a guess to the key. We define fuzzy min-entropy to quantify this property of a noisy source of...
Moisture samples taken from the unsaturated zone with soil water extractors undergo degassing and an upward shift in pH. The measured pH values from commercially available extractors are usually sufficiently in error that they cannot be used in a quantitative manner. A model has been developed that predicts the extent of CO2 degassing and the resulting pH error. Using this model measured pH val...
We construct a strong extractor against quantum storage that works for every min-entropy k, has logarithmic seed length, and outputs Ω(k) bits, provided that the quantum adversary has at most βk qubits of memory, for any β < 1 2 . The construction works by first condensing the source (with minimal entropy-loss) and then applying an extractor that works well against quantum adversaries when the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید