搜索结果: 1-15 共查到“Entropy”相关记录354条 . 查询时间(0.156 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Entropy-Dissipation Informed Neural Networks for McKean-Vlasov type PDEs
McKean-Vlasov型 偏微分方程 熵耗散 信息神经网络
2023/4/13
袁源副研究员:Blowup of the entropy-bounded classical solutions to the nonisentropic compressible Navier-Stokes equations
非等熵 可压缩 纳维-斯托克斯方程 熵界经典解 爆炸
2023/4/11
最近,理学院物理系本科生王亚鹏以第一作者的身份在MDPI旗下的国际学术期刊Entropy(IF:2.494)上发表题为“Digital quantum simulation of nonadiabatic geometric gates via shortcuts to adiabaticity”的学术论文。王亚鹏为2017级物理系应用物理专业本科生。2019年底进入上海大学量子人工智能科学技术中...
The specification of Bluetooth and Bluetooth Low Energy includes dedicated encryption key negotiation protocols used by two parties to agree on the entropy of encryption keys. In this work, we show th...
Complexity of Estimating Renyi Entropy of Markov Chains
information theory Renyi entropy Min-entropy
2019/7/8
Estimating entropy of random processes is one of the fundamental problems of machine learning and property testing. It has numerous applications to anything from DNA testing and predictability of huma...
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy
deterministic identity-based encryption adaptively secure auxiliary-input
2019/1/26
There only exists one deterministic identity-based encryption (DIBE) scheme which is adaptively secure in the auxiliary-input setting, under the learning with errors (LWE) assumption. However, the mas...
Function Private Predicate Encryption for Low Min-Entropy Predicates
public-key cryptography ZIPE
2019/1/4
In this work, we propose new predicate encryption schemes for zero inner-product encryption (ZIPE) and non-zero inner-product encryption (NIPE) predicates from prime-order bilinear pairings, which are...
Information Entropy Based Leakage Certification
information theory maximum entropy maximum entropy distribution
2018/11/6
Side-channel attacks and evaluations typically utilize leakage models to extract sensitive information from measurements of cryptographic implementations. Efforts to establish a true leakage model is ...
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
Predicate Encryption Public-Key Function Privacy
2018/3/6
We present function private public-key predicate encryption schemes from standard cryptographic assumptions, that achieve new lower bounds on the min-entropy of underlying predicate distributions. Exi...
Unbounded ABE via Bilinear Entropy Expansion, Revisited
public-key cryptography attribute-based encryption
2018/2/1
At the core of all of these constructions is a "bilinear entropy expansion" lemma that allows us to generate any polynomial amount of entropy starting from constant-size public parameters; the entropy...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
AES Side Channel Attacks
2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...
On the impossibility of entropy reversal, and its application to zero-knowledge proofs
statistical zero-knowledge proof entropy reversal black-box reduction
2017/9/25
Zero knowledge proof systems have been widely studied in cryptography. In the statistical setting, two classes of proof systems studied are Statistical Zero Knowledge (SZK) and Non-Interactive Statist...
Renyi Entropy Estimation Revisited
Renyi Entropy Estimation Renyi Entropy Sample Complexity
2017/6/22
We revisit the problem of estimating entropy of discrete distributions from independent samples, studied recently by Acharya, Orlitsky, Suresh and Tyagi (SODA 2015), improving their upper and lower bo...
By precisely measuring the entropy of a cerium copper gold alloy with baffling electronic properties cooled to nearly absolute zero, physicists in Germany and the United States have gleaned new eviden...
Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT
Computational fuzzy extractor Learning with errors Authentication system
2016/12/8
With the advent of the Internet of Things, lightweight devices necessitate secure and cost-efficient key storage. Since traditional secure storage is expensive, the valuable entropy could originate fr...