Sciweavers

58 search results - page 3 / 12
» How Leaky Is an Extractor
Sort
View
CORR
2011
Springer
143views Education» more  CORR 2011»
12 years 9 months ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
IJON
1998
95views more  IJON 1998»
13 years 5 months ago
Self-organization and segmentation in a laterally connected orientation map of spiking neurons
The RF-SLISSOM model integrates two separate lines of research on computational modeling of the visual cortex. Laterally connected self-organizing maps have been used to model how...
Yoonsuck Choe, Risto Miikkulainen
CCS
2004
ACM
13 years 10 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
STOC
2006
ACM
108views Algorithms» more  STOC 2006»
14 years 5 months ago
Extractors for a constant number of polynomially small min-entropy independent sources
We consider the problem of randomness extraction from independent sources. We construct an extractor that can extract from a constant number of independent sources of length n, ea...
Anup Rao
MSR
2005
ACM
13 years 11 months ago
Using a clone genealogy extractor for understanding and supporting evolution of code clones
Programmers often create similar code snippets or reuse existing code snippets by copying and pasting. Code clones —syntactically and semantically similar code snippets—can ca...
Miryung Kim, David Notkin