Sciweavers

3898 search results - page 186 / 780
» On the Bit Extraction Problem
Sort
View
STOC
2010
ACM
189views Algorithms» more  STOC 2010»
16 years 10 days ago
Near-optimal extractors against quantum storage
We give near-optimal constructions of extractors secure against quantum bounded-storage adversaries. One instantiation gives the first such extractor to achieve an output length (...
Anindya De and Thomas Vidick
UC
2009
Springer
15 years 9 months ago
Abstract Geometrical Computation and Computable Analysis
Geometrical Computation and Computable Analysis J´erˆome Durand-Lose⋆ Laboratoire d’Informatique Fondamentale d’Orl´eans, Universit´e d’Orl´eans, B.P. 6759, F-45067 OR...
Jérôme Durand-Lose
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
15 years 8 months ago
An error-correcting unordered code and hardware support for robust asynchronous global communication
A new delay-insensitive data encoding scheme for global asynchronous communication is introduced. The goal of this work is to combine the timing-robustness of delay-insensitive (i....
Melinda Y. Agyekum, Steven M. Nowick
GLVLSI
2009
IEEE
170views VLSI» more  GLVLSI 2009»
15 years 6 months ago
Physical unclonable function and true random number generator: a compact and scalable implementation
Physical Unclonable Functions (PUF) and True Random Number Generators (TRNG) are two very useful components in secure system design. PUFs can be used to extract chip-unique signat...
Abhranil Maiti, Raghunandan Nagesh, Anand Reddy, P...
DSMML
2004
Springer
15 years 6 months ago
Efficient Communication by Breathing
The arithmetic-coding-based communication system, Dasher, can be driven by a one-dimensional continuous signal. A belt-mounted breath-mouse, delivering a signal related to lung vol...
Tom Shorrock, David MacKay, Chris Ball