Min-entropy

Results: 44



#Item
21Improving Language Model Size Reduction using Better Pruning Criteria Jianfeng Gao Min Zhang1

Improving Language Model Size Reduction using Better Pruning Criteria Jianfeng Gao Min Zhang1

Add to Reading List

Source URL: www.thuir.cn

Language: English - Date: 2008-03-24 08:40:48
22Games for Extracting Randomness∗ Ran Halprin and Moni Naor† Department of Computer Science and Applied Mathematics Weizmann Institute of Science {ran.halprin, moni.naor}@weizmann.ac.il

Games for Extracting Randomness∗ Ran Halprin and Moni Naor† Department of Computer Science and Applied Mathematics Weizmann Institute of Science {ran.halprin, moni.naor}@weizmann.ac.il

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-18 19:46:36
23The entropic principle /dev/u?random and NetBSD Taylor ‘Riastradh’ Campbell [removed] [removed]

The entropic principle /dev/u?random and NetBSD Taylor ‘Riastradh’ Campbell [removed] [removed]

Add to Reading List

Source URL: netbsd.org

Language: English - Date: 2014-11-30 16:50:20
24The entropic principle /dev/u?random and NetBSD Taylor ‘Riastradh’ Campbell

The entropic principle /dev/u?random and NetBSD Taylor ‘Riastradh’ Campbell

Add to Reading List

Source URL: www.netbsd.org

Language: English - Date: 2014-11-30 16:50:20
25April 25, 2013  Randomness in Cryptography Lecture 15: Privacy Amplification against Active Attackers Lecturer: Yevgeniy Dodis

April 25, 2013 Randomness in Cryptography Lecture 15: Privacy Amplification against Active Attackers Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
26Randomness in Cryptography  January 21, 2013 Lecture 7: Privacy ⇒ Extraction Continued Lecturer: Yevgeniy Dodis

Randomness in Cryptography January 21, 2013 Lecture 7: Privacy ⇒ Extraction Continued Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2014-04-02 21:07:51
27Randomness in Cryptography  May 2, 2013 Lecture 16: Special Purpose Extractors Lecturer: Yevgeniy Dodis

Randomness in Cryptography May 2, 2013 Lecture 16: Special Purpose Extractors Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
28Fuzzy extractors for continuous distributions Ileana Buhan, Jeroen Doumen, Pieter Hartel, Raymond Veldhuis, EEMCS Faculty, University of Twente, {Ileana.Buhan, Jeroen.Doumen, Pieter.Hartel, Raymond.Veldhuis}@utwente.nl A

Fuzzy extractors for continuous distributions Ileana Buhan, Jeroen Doumen, Pieter Hartel, Raymond Veldhuis, EEMCS Faculty, University of Twente, {Ileana.Buhan, Jeroen.Doumen, Pieter.Hartel, Raymond.Veldhuis}@utwente.nl A

Add to Reading List

Source URL: doc.utwente.nl

Language: English - Date: 2011-08-28 11:31:58
29High Entropy Random Selection Protocols∗ Harry Buhrman †  Matthias Christandl

High Entropy Random Selection Protocols∗ Harry Buhrman † Matthias Christandl

Add to Reading List

Source URL: lpcs.math.msu.su

Language: English - Date: 2013-10-10 04:27:15
30Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification Xin Li∗ Department of Computer Science Johns Hopkins University Baltimore, MD 21218, U.S.A.

Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification Xin Li∗ Department of Computer Science Johns Hopkins University Baltimore, MD 21218, U.S.A.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-11 17:35:40