搜索结果: 76-90 共查到“functions”相关记录1699条 . 查询时间(0.166 秒)
Hadamard Matrices, d-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Boolean functions Correlation-immune Minimum-weight
2018/3/26
It is known that correlation-immune (CI) Boolean functions used in the framework of side channel attacks need to have low Hamming weights. In 2013, Bhasin et al. studied the minimum Hamming weight of ...
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling
memory-hard functions pebbling space-time trade-offs
2018/3/5
Pebble games were originally formulated to study time-space tradeoffs in computation, modeled by games played on directed acyclic graphs (DAGs). Close connections between pebbling and cryptography hav...
Bandwidth-Hard Functions: Reductions and Lower Bounds
Cryptanalysis Hash Functions Bandwidth-Hard Functions
2018/3/5
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the computational speed of general purpose CPUs and Application Specific Integrated Circuits (ASICs). MHF...
S-boxes, typically the only nonlinear part of a block cipher, are the heart of symmetric cryptographic primitives. They significantly impact the cryptographic strength and the implementation character...
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform
Correlation-immune Fourier-Hadamard transform Low Hamming weight
2018/1/27
The correlation immunity of Boolean functions is a property related to cryptography, to error correcting codes, to orthogonal arrays (in combinatorics, which was also a domain of interest of S. Golomb...
Artificial Enzyme:Protein Designed Entirely From Scratch Functions In Cells As A Life-Sustaining Catalyst(图)
Artificial Enzyme Protein Designed Entirely Scratch Functions In Cells Life-Sustaining Catalyst
2018/2/1
A dawning field of research, artificial biology, is working toward creating a genuinely new organism. At Princeton, chemistryprofessor Michael Hecht and the researchers in his lab are d...
四川大学生物化学英文课件Chapter2 Structure & Functions of Nucleic Acids
四川大学 生物化学 英文课件 Chapter2 Structure & Functions of Nucleic Acids
2018/1/18
四川大学生物化学英文课件Chapter2 Structure & Functions of Nucleic Acids。
四川大学人体生理学(I)课件CHAPTER10 FUNCTIONS OF THE NERVOUS SYSTEM
四川大学 人体生理学(I) 课件 CHAPTER10 FUNCTIONS OF THE NERVOUS SYSTEM
2018/1/16
四川大学人体生理学(I)课件CHAPTER10 FUNCTIONS OF THE NERVOUS SYSTEM。
四川大学人体生理学(I)课件CHAPTER2 BASIC FUNCTIONS OF CELL
四川大学 人体生理学(I) 课件 CHAPTER2 BASIC FUNCTIONS OF CELL
2018/1/16
四川大学人体生理学(I)课件CHAPTER2 BASIC FUNCTIONS OF CELL。
The Multiplicative Complexity of 6-variable Boolean Functions
Affine equivalence Boolean functions Circuit complexity
2018/1/12
The multiplicative complexity of a Boolean function is the minimum number of AND gates that are necessary and sufficient to implement the function over the basis (AND, XOR, NOT). Finding the multiplic...
Regularly Lossy Functions and Their Applications
public-key cryptography leakage-resilient cryptography
2018/1/11
In STOC 2008, Peikert and Waters introduced a powerful primitive called lossy trapdoor functions (LTFs). In a nutshell, LTFs are functions that behave in one of two modes. In the normal mode, function...
Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations
correlation uniform random function uniform random permutation
2017/12/25
Daeman and Rijmen had derived the distributions of correlations between linear combinations of the input and output of uniform random functions and uniform random permutations. We generalise their res...
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials
sum-free sets Dickson polynomials
2017/12/11
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials.
A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes
public-key cryptography BFs
2017/12/1
4-bit Linear Relations play an important role in Cryptanalysis of 4-bit Bijective Crypto S-boxes. 4-bit finite differences also a major part of cryptanalysis of 4-bit substitution boxes. Count of exis...
Hardness of Non-Interactive Differential Privacy from One-Way Functions
differential privacy one-way functions traitor tracing
2017/11/21
A central challenge in differential privacy is to design computationally efficient noninteractive algorithms that can answer large numbers of statistical queries on a sensitive dataset. That is, we wo...