Compressed Sensing based encryption is computationally secure in a one time key scenario, but it does not resist chosen plaintext attacks (CPA) due to the deterministic encryption...
We show that the Kth largest subset problem and the Kth largest m-tuple problem are in PP and hard for PP under polynomial-time Turing reductions. Several problems from the litera...
Bitcoin supports complex transactions where the recipient of a transaction can be programmatically determined. Using these transactions, multiparty computation protocols that aim ...
In this note, we show that over fields of any characteristic, exponential sums of Boolean instantiations of polynomials computed by multilinear circuits can be computed by multil...
We define and study a slight variation on the semantics of Strategy Logic: while in the classical semantics, all strategies are shifted during the evaluation of temporal modaliti...
The Fibonacci cube Γn is obtained from the n-cube Qn by removing all the vertices that contain two consecutive 1s. It is proved that Γn admits a perfect code if and only if n ...
Ali Reza Ashrafi, Jernej Azarija, Azam Babai, Khad...
Abstract—Intrabody nanonetworks for nervous system monitoring are envisioned as a key application of the Internet of Nano-Things paradigm, with the aim of developing radically ne...
—Electromagnetic communication among nanosensors using Time-Spread On-Off Keying (TS-OOK) modulation in Terahertz band promises very high transmission rates (up to several Terabi...
Muhammad Agus Zainuddin, Eugen Dedu, Julien Bourge...
—Molecular devices, which consist of single or a few molecules, are envisioned to perform advanced tasks such as molecular information processing and collaborative sensing/actuat...