搜索结果: 1-6 共查到“军队指挥学 pseudoentropy”相关记录6条 . 查询时间(0.046 秒)
On the Complexity of Breaking Pseudoentropy
nonuniform attacks pseudoentropy smooth entropy
2017/1/3
Pseudoentropy has found a lot of important applications to cryptography and complexity theory. In this paper we focus on the foundational problem that has not been investigated so far, namely by how m...
Pseudoentropy: Lower-bounds for Chain rules and Transformations
pseudorandomness pseudoentropy lower bounds
2016/2/23
Computational notions of entropy have recently found many applications, including leakageresilient
cryptography, deterministic encryption or memory delegation. The two main types of
results which ma...
A Tight Transformation between HILL and Metric Conditional Pseudoentropy
Pseudoentropy Dense Model Theorem Convex Approximation
2016/1/6
The notion of HILL Entropy appeared in the breakthrough construction of a PRG from any one-way function (H錽tad et al.), and has become the most important and most widely used variant of computational ...
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy
Hardcore Lemmas Pseudoentropy
2016/1/4
Using only the standard min-max theorem and some basic facts about convex approximations in Lp spaces, we provide alternative modular proofs and some generalizations of these results in the nonuniform...
Computational notions of entropy (a.k.a. pseudoentropy) have
found many applications, including leakage-resilient cryptography, deterministic
encryption or memory delegation. The most important tool...
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy
leakage-resilient cryptography information-theory pseudoentropy
2015/12/23
Leakage-resilient cryptography builds systems that withstand partial
adversary knowledge of secret state. Ideally, leakage-resilient systems
withstand current and future attacks; restoring confidenc...