Complexity function

Results: 282



#Item
41Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:32:58
42

A Complexity Tradeoff in Ranking-Function Termination Proofs Amir M. Ben-Amram∗ April 25, 2008 Abstract

Add to Reading List

Source URL: www2.mta.ac.il

Language: English - Date: 2008-04-26 10:56:07
    43

    THE AUTOMORPHISM GROUP OF A SHIFT OF LINEAR GROWTH: BEYOND TRANSITIVITY VAN CYR AND BRYNA KRA Abstract. For a finite alphabet A and shift X ⊆ AZ whose factor complexity function grows at most linearly, we study the alg

    Add to Reading List

    Source URL: www.facstaff.bucknell.edu

    Language: English - Date: 2014-11-02 15:47:47
      44Applied mathematics / Quantum complexity theory / Computational complexity theory / Secure multi-party computation / Communication complexity / Secure two-party computation / PP / One-way function / IP / Cryptography / Theoretical computer science / Cryptographic protocols

      Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-09-04 05:09:56
      45Continuous function / Envelope / Measure theory / Fourier analysis / Essential range / Itō diffusion / Mathematical analysis / Mathematics / Normal distribution

      Empirical and multiplier bootstrap for suprema of empirical processes of increasing complexity, and related Gaussian couplings. Victor Chernozhukova , Denis Chetverikovb , Kengo Katoc a

      Add to Reading List

      Source URL: www.econ.ucla.edu

      Language: English - Date: 2015-05-27 16:36:02
      46Information science / Linked list / Hash table / Stack / Hash function / Cuckoo hashing / Time complexity / Heap / Search algorithms / Theoretical computer science / Applied mathematics

      A heaviest hitters limiting mechanism with O(1) time complexity for sliding-window data streams Remous-Aris Koutsiamanis and Pavlos S. Efraimidis Department of Electrical and Computer Engineering Democritus University of

      Add to Reading List

      Source URL: www.spice-center.org

      Language: English - Date: 2012-12-19 06:11:27
      47

      ESRC Seminar Series Complexity and Method in Social Sciences My Kingdom for a Function: What is gained by quantifying complex social science research? 9 May 2014 Humanities Building, H5.45

      Add to Reading List

      Source URL: blogs.cim.warwick.ac.uk

      Language: English - Date: 2014-04-28 09:41:02
        48Error detection and correction / Information retrieval / Artificial intelligence / Computational complexity theory / Universal hashing / Lipschitz continuity / Hash function / Combinatory logic / Tabulation hashing / Search algorithms / Hashing / Theoretical computer science

        Compressive sensing using locality-preserving matrices Elyot Grant∗ Piotr Indyk∗ December 4, 2012

        Add to Reading List

        Source URL: people.csail.mit.edu

        Language: English - Date: 2013-06-10 19:22:49
        49Data privacy / Applied probability / Exponential mechanism / Time complexity / Differential privacy / Constructible universe / Polynomial / Negligible function / PP / Theoretical computer science / Mathematics / Computational complexity theory

        When and How Can Data be Efficiently Released with Privacy? Cynthia Dwork Moni Naor∗ Omer Reingold Salil Vadhan

        Add to Reading List

        Source URL: www.wisdom.weizmann.ac.il

        Language: English - Date: 2010-11-01 14:13:39
        50Search algorithms / Cryptographic hash functions / Analysis of algorithms / Probabilistic complexity theory / Randomized algorithm / PP / Algorithm / Hash function / Universal hashing / Theoretical computer science / Applied mathematics / Computational complexity theory

        A Scalable and Nearly Uniform Generator of SAT Witnesses? Supratik Chakraborty1 , Kuldeep S. Meel2 , and Moshe Y. Vardi2 1 2

        Add to Reading List

        Source URL: www.cs.rice.edu

        Language: English - Date: 2013-07-17 18:10:56
        UPDATE