Min entropy

Results: 44



#Item
21Science / Natural language processing / Decision trees / Information theory / Philosophy of thermal and statistical physics / Perplexity / Bigram / Pruning / Entropy / Statistics / Statistical theory / Probability and statistics

Improving Language Model Size Reduction using Better Pruning Criteria Jianfeng Gao Min Zhang1

Add to Reading List

Source URL: www.thuir.cn

Language: English - Date: 2008-03-24 08:40:48
22Mathematics / Randomness extractor / Random number generation / Pseudorandomness / Min-entropy / Entropy / Random sequence / One-time pad / Statistical randomness / Randomness / Cryptography / Applied mathematics

Games for Extracting Randomness∗ Ran Halprin and Moni Naor† Department of Computer Science and Applied Mathematics Weizmann Institute of Science {ran.halprin, moni.naor}@weizmann.ac.il

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-18 19:46:36
23Probability and statistics / Pseudorandom number generators / Causality / /dev/random / Device file / Unix / Entropy / Random number generation / Min-entropy / Randomness / Information theory / Cryptography

The entropic principle /dev/u?random and NetBSD Taylor ‘Riastradh’ Campbell [removed] [removed]

Add to Reading List

Source URL: netbsd.org

Language: English - Date: 2014-11-30 16:50:20
24Probability and statistics / Pseudorandom number generators / Causality / /dev/random / Device file / Unix / Entropy / Random number generation / Min-entropy / Randomness / Information theory / Cryptography

The entropic principle /dev/u?random and NetBSD Taylor ‘Riastradh’ Campbell

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2014-11-30 16:50:20
25Cryptography / Randomness / Extractor / Pseudorandomness / Min-entropy / Leftover hash lemma / Entropy / Randomness extractor / Information theory / Applied mathematics / Theoretical computer science

April 25, 2013 Randomness in Cryptography Lecture 15: Privacy Amplification against Active Attackers Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
26Information theory / Min-entropy / Extractor / Lemmas / Computational complexity theory / Randomness extractor / Theoretical computer science / Mathematics / Applied mathematics

Randomness in Cryptography January 21, 2013 Lecture 7: Privacy ⇒ Extraction Continued Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2014-04-02 21:07:51
27Randomness / Computational complexity theory / Information theory / Randomness extractor / Pseudorandomness / Extractor / Min-entropy / Leftover hash lemma / Entropy / Theoretical computer science / Applied mathematics / Cryptography

Randomness in Cryptography May 2, 2013 Lecture 16: Special Purpose Extractors Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
28Statistical theory / Theoretical computer science / Randomness / Biometrics / Identification / Surveillance / Entropy / Extractor / Min-entropy / Information theory / Information / Applied mathematics

Fuzzy extractors for continuous distributions Ileana Buhan, Jeroen Doumen, Pieter Hartel, Raymond Veldhuis, EEMCS Faculty, University of Twente, {Ileana.Buhan, Jeroen.Doumen, Pieter.Hartel, Raymond.Veldhuis}@utwente.nl A

Add to Reading List

Source URL: doc.utwente.nl

Language: English - Date: 2011-08-28 11:31:58
29Information / Entropy / Min-entropy / Quantities of information / Information theory / Statistics / Probability and statistics

High Entropy Random Selection Protocols∗ Harry Buhrman † Matthias Christandl

Add to Reading List

Source URL: lpcs.math.msu.su

Language: English - Date: 2013-10-10 04:27:15
30Cryptography / Entropy / Min-entropy / Leftover hash lemma / Communication complexity / Extractor / Commitment scheme / Randomness extractor / Theoretical computer science / Information theory / Applied mathematics

Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification Xin Li∗ Department of Computer Science Johns Hopkins University Baltimore, MD 21218, U.S.A.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 17:35:40
UPDATE