搜索结果: 1-8 共查到“军事学 estimating”相关记录8条 . 查询时间(0.029 秒)
Complexity of Estimating Renyi Entropy of Markov Chains
information theory Renyi entropy Min-entropy
2019/7/8
Estimating entropy of random processes is one of the fundamental problems of machine learning and property testing. It has numerous applications to anything from DNA testing and predictability of huma...
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness
information theory foundations distributed cryptography
2019/7/8
Consider the representative task of designing a distributed coin-tossing protocol for nn processors such that the probability of heads is X0∈[0,1]X0∈[0,1], and an adversary can reset one processor to ...
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
quantum cryptanalysis hash functions cost models
2016/12/8
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is ...
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n
Stream ciphers fast algebraic attacks time complexity
2016/7/7
Although several methods for estimating the resistance of a random Boolean function against (fast) algebraic attacks were proposed, these methods are usually infeasible in practice for relative large ...
Can Large Deviation Theory be Used for Estimating Data Complexity?
block ciphers cryptanalysis data complexity
2016/5/17
Statistical analysis of attacks on block ciphers have mostly used normal approximations. A few recent works have proposed doing away with normal approximations and instead use Chernoff and Hoeffding b...
Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath
polynomial quotient ring SAT solver Rijndael AES
2015/12/29
Methods are presented to derive with the aid of the computer
mathematics software system SageMath the Multivariate Quadratic
equation systems (MQ) for the input and output bit variables of a
crypto...
Estimating Key Sizes For High Dimensional Lattice-Based Systems
lattice techniques cryptanalysis bkz
2014/3/7
We revisit the estimation of parameters for use in applications of the BGV homomorphic encryption system, which generally require high dimensional lattices. In particular, we utilize the BKZ-2.0 simul...
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Elliptic Curves Function Fields Hash Functions
2010/2/1
Let E be a non-supersingular elliptic curve over a finite field
Fq. At CRYPTO 2009, Icart [5] introduced a deterministic function Fq
E(Fq) which can be computed eciently, and allowed him and Coron
...