We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,170 results
  1. Direct Product Hardness Amplification

    We revisit one of the most fundamental hardness amplification constructions, originally proposed by Yao (FOCS 1982). We present a hardness...
    David Lanzenberger, Ueli Maurer in Theory of Cryptography
    Conference paper 2021
  2. Constructions of column-orthogonal strong orthogonal arrays via matchings of bipartite graphs

    Strong orthogonal arrays (SOAs) have better space-filling properties than ordinary orthogonal arrays for computer experiments. SOAs of strengths two...

    Article 25 July 2023
  3. Strong metric dimension in annihilating-ideal graph of commutative rings

    In this paper, using Gallai’s Theorem and the notion of strong resolving graph, we determine the strong metric dimension in annihilating-ideal graph...

    Article 01 August 2022
  4. Efficiently-Verifiable Strong Uniquely Solvable Puzzles and Matrix Multiplication

    We advance the Cohn-Umans framework for develo** fast matrix multiplication algorithms. We introduce, analyze, and search for a new subclass of...
    Matthew Anderson, Vu Le in Computing and Combinatorics
    Conference paper 2024
  5. Ramsey’s theorem

    Ramsey proved his eponymous theorem in his 1929 paper “On a problem of formal logic” [253]. The focus was actually not on combinatorics at all, but...
    Damir D. Dzhafarov, Carl Mummert in Reverse Mathematics
    Chapter 2022
  6. Average case error estimates of the strong Lucas test

    Reliable probabilistic primality tests are fundamental in public-key cryptography. In adversarial scenarios, a composite with a high probability of...

    Semira Einsele, Kenneth Paterson in Designs, Codes and Cryptography
    Article Open access 18 January 2024
  7. Modular language product lines: concept, tool and analysis

    Modelling languages are intensively used in paradigms like model-driven engineering to automate all tasks of the development process. These languages...

    Juan de Lara, Esther Guerra, Paolo Bottoni in Software and Systems Modeling
    Article Open access 28 May 2024
  8. On Strong Basins of Attractions for Non-convex Sparse Spike Estimation: Upper and Lower Bounds

    In this article, we study the size of strong basins of attractions for the non-convex sparse spike estimation problem. We first extend previous...

    Yann Traonmilin, Jean-François Aujol, ... Arthur Leclaire in Journal of Mathematical Imaging and Vision
    Article 28 September 2023
  9. Research on chaos of product color image system driven by brand image

    Chaos means innovation in the field of design. Meanwhile, the product image system is not only a quantified ‘formula’ between product and...

    **nxin Zhang, Yueying Li, ... Man Ding in Multimedia Tools and Applications
    Article 25 February 2023
  10. Metric dimension and strong metric dimension in annihilator-ideal graphs

    Let R be a commutative ring with identity and A ( R ) be the set of ideals with non-zero annihilator. The annihilator-ideal graph of R is defined as the...

    R. Shahriyari, R. Nikandish, ... H. Rasouli in Applicable Algebra in Engineering, Communication and Computing
    Article 20 April 2024
  11. On Derandomizing Yao’s Weak-to-Strong OWF Construction

    The celebrated result of Yao (Yao, FOCS’82) shows that concatenating $$n\cdot...
    Chris Brzuska, Geoffroy Couteau, ... Felix Rohrbach in Theory of Cryptography
    Conference paper 2021
  12. Parallel Single-Pixel Imaging: A General Method for Direct–Global Separation and 3D Shape Reconstruction Under Strong Global Illumination

    We present parallel single-pixel imaging (PSI), a photography technique that captures light transport coefficients and enables the separation of...

    Hongzhi Jiang, Yuxi Li, ... Yang Xu in International Journal of Computer Vision
    Article Open access 06 January 2021
  13. Yet Another Impossibility Theorem in Algorithmic Fairness

    In recent years, there has been a surge in research addressing the question which properties predictive algorithms ought to satisfy in order to be...

    Fabian Beigang in Minds and Machines
    Article 08 September 2023
  14. Enhancing and Evaluating the Product Fuzzy DPLL Solver

    In recent years we have seen a number of satisfiability solvers emerge in the world of fuzzy propositional logics. However, only a few of them can...

    Ivor Uhliarik in SN Computer Science
    Article 21 July 2022
  15. The Myhill-Nerode Theorem: Implications and Applications

    With this chapter, we arrive finally at the first of the blockbuster results that underlie computation theory. The Myhill–Nerode theorem of Finite...
    Arnold L. Rosenberg, Lenwood S. Heath in Understanding Computation
    Chapter 2022
  16. When Is Context-Freeness Distinguishable from Regularity? an Extension of Parikh’s Theorem

    Parikh’s theorem states that for every CFL X, there exists a regular language...
    Yusuke Inoue, Kenji Hashimoto, Hiroyuki Seki in Implementation and Application of Automata
    Conference paper 2023
  17. Pattern Matching in Encrypted Stream from Inner Product Encryption

    Functional encryption features secret keys, each associated with a key function f, which allow to directly recover f(x) from an encryption of x,...
    Élie Bouscatié, Guilhem Castagnos, Olivier Sanders in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  18. Key-Recovery by Side-Channel Information on the Matrix-Vector Product in Code-Based Cryptosystems

    The modern security protocols in most of our systems rely primarily on three basic functions of asymmetric cryptography: public key encryption,...
    Boly Seck, Pierre-Louis Cayrel, ... Vincent Grosso in Information Security and Cryptology – ICISC 2022
    Conference paper 2023
Did you find what you were looking for? Share feedback.