We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Generalized Coloring of Permutations

    Vít Jelínek, Michal Opler, Pavel Valtr in Algorithmica
    Article 29 March 2024
  2. Generating Signed Permutations by Twisting Two-Sided Ribbons

    We provide a simple approach to generating all \(2^n \cdot n!\)...
    Yuan Qiu, Aaron Williams in LATIN 2024: Theoretical Informatics
    Conference paper 2024
  3. Sequences, Series, and Permutations and Combinations

    This chapter discusses sequences, series, and permutations and combinations. Arithmetic and geometric sequences and series are discussed and we...
    Chapter 2023
  4. Recursive inversion models for permutations

    We develop a new exponential family model for permutations that can capture hierarchical structure in preferences, and that has the well known...

    Marina Meilă, Annelise Wagner, Christopher Meek in Statistics and Computing
    Article 20 June 2022
  5. The sequence reconstruction problem for permutations with the Hamming distance

    V. Levenshtein first proposed the sequence reconstruction problem in 2001. This problem studies the same sequence from some set is transmitted over...

    **ang Wang, Elena V. Konstantinova in Cryptography and Communications
    Article 02 May 2024
  6. On a conjecture on APN permutations

    The single trivariate representation proposed in [C. Beierle, C. Carlet, G. Leander, L. Perrin, A Further Study of Quadratic APN Permutations in...

    Daniele Bartoli, Marco Timpanella in Cryptography and Communications
    Article 09 March 2022
  7. On decompositions of permutation polynomials into quadratic and cubic power permutations

    Decomposing permutation polynomials into power permutations of small algebraic facilitates the reduction of hardware area requirements when symmetric...

    George Petrides in Cryptography and Communications
    Article 18 July 2022
  8. Revisiting the Indifferentiability of the Sum of Permutations

    The sum of two n-bit pseudorandom permutations is known to behave like a pseudorandom function with n bits of security. A recent line of research has...
    Aldo Gunsing, Ritam Bhaumik, ... Yaobin Shen in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  9. Reconstruction of permutations distorted by single Kendall τ-errors

    Levenshtein first put forward the sequence reconstruction problem in 2001. This problem sets a model in which a sequence from some set is transmitted...

    Article 25 June 2022
  10. Keyed Sum of Permutations: A Simpler RP-Based PRF

    Idealized constructions in cryptography prove the security of a primitive based on the security of another primitive. The challenge of building a...
    Ferdinand Sibleyras, Yosuke Todo in Topics in Cryptology – CT-RSA 2023
    Conference paper 2023
  11. Decoding Tree Decompositions from Permutations

    Most algorithmic strategies for solving problems considering treewidth parameterization require that a tree decomposition is given. Given a graph...
    Samuel Eduardo da Silva, Uéverton S. Souza in LATIN 2024: Theoretical Informatics
    Conference paper 2024
  12. A note on “Cryptographically strong permutations from the butterfly structure”

    Very recently, a class of cryptographically strong permutations with boomerang uniformity 4 and the best known nonlinearity is constructed from the...

    Nian Li, Zhao Hu, ... **angyong Zeng in Designs, Codes and Cryptography
    Article 15 January 2022
  13. Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations

    This work studies the key-alternating ciphers (KACs) whose round permutations are not necessarily independent. We revisit existing security proofs...
    Liqing Yu, Yusai Wu, ... **aolei Dong in Theory of Cryptography
    Conference paper 2023
  14. Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations

    Linear cryptanalysis considers correlations between linear input and output combiners for block ciphers and stream ciphers. Daemen and Rijmen (2007)...
    Subhabrata Samajder, Palash Sarkar in Cyber Security, Cryptology, and Machine Learning
    Conference paper 2023
  15. A Difference-Equation-Based Robust Image Encryption Scheme with Chaotic Permutations and Logic Gates

    Image encryption has become an indispensable tool for achieving highly secure image-based communications. Numerous encryption approaches have...

    M. H. Annaby, H. A. Ayad, M. A. Rushdi in Journal of Mathematical Imaging and Vision
    Article Open access 19 May 2022
  16. Multi-user BBB security of public permutations based MAC

    At CRYPTO 2019, Chen et al. have shown a beyond the birthday bound secure n -bit to n -bit PRF based on public random permutations. Followed by the...

    Yu Long Chen, Avijit Dutta, Mridul Nandi in Cryptography and Communications
    Article 11 May 2022
  17. Minwise-Independent Permutations with Insertion and Deletion of Features

    The seminal work of Broder et al. [5] introduces the \(\textrm{minHash}\)...
    Rameshwar Pratap, Raghav Kulkarni in Similarity Search and Applications
    Conference paper 2023
  18. New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks

    The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were proposed in the literature, leading...
    Stéphanie Delaune, Patrick Derbez, ... Charles Prud’homme in Progress in Cryptology – INDOCRYPT 2022
    Conference paper 2022
Did you find what you were looking for? Share feedback.