Sciweavers

264 search results - page 6 / 53
» On Linear Cryptanalysis with Many Linear Approximations
Sort
View
ASIACRYPT
2001
Springer
15 years 3 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
COMBINATORICS
2007
112views more  COMBINATORICS 2007»
14 years 11 months ago
Reversal Distance for Strings with Duplicates: Linear Time Approximation using Hitting Set
In the last decade there has been an ongoing interest in string comparison problems; to a large extend the interest was stimulated by genome rearrangement problems in computationa...
Petr Kolman, Tomasz Walen
ICISC
2001
132views Cryptology» more  ICISC 2001»
15 years 1 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
JMLR
2006
140views more  JMLR 2006»
14 years 11 months ago
Active Learning in Approximately Linear Regression Based on Conditional Expectation of Generalization Error
The goal of active learning is to determine the locations of training input points so that the generalization error is minimized. We discuss the problem of active learning in line...
Masashi Sugiyama
ESANN
2004
15 years 1 months ago
Linearization identification and an application to BSS using a SOM
The one-dimensional functional equation g(y(t)) = cg(z(t)) with known functions y and z and constant c is considered. The indeterminacies are calculated, and an algorithm for appro...
Fabian J. Theis, Elmar Wolfgang Lang