Randomness

Results: 1720



#Item
821Digital typography / Symbol / Envelope

Randomness in Cryptography February 7, 2013 Lecture 5: SV-robust Mechanisms and Bias-Control-Limited Source Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2014-03-13 14:43:40
822Pseudorandomness / Computational complexity theory / Randomness / Randomness extractor / Pseudorandom generator / Extractor / Leftover hash lemma / Information theory / Entropy / Theoretical computer science / Applied mathematics / Mathematics

Randomness in Cryptography April 6, 2013 Lecture 12: Computational Key Derivation Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:30
823Discrete mathematics / Randomness / Abstract algebra / Random permutation / Advanced Encryption Standard / Mathematics / Permutations / Combinatorics

SHLOMO HOORY, University of British Columbia Simple permutations mix well A naturally occurring question in cryptography is how well the composition of simple permutations drawn from a simple distribution resembles a ran

Add to Reading List

Source URL: cms.math.ca

Language: English - Date: 2006-07-10 21:18:20
824Computational complexity theory / Randomness extractor / Information theory / Finite fields / Leftover hash lemma / Entropy / XTR / Pseudorandom generator / Cryptographic hash function / Cryptography / Applied mathematics / Randomness

Overcoming Weak Expectations Yevgeniy Dodis∗ Yu Yu† December 22, 2012

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2012-12-22 10:21:59
825Mathematics / Computational complexity theory / Randomness extractor / Pseudorandomness / Information theory / Entropy / Extractor / Leftover hash lemma / Theoretical computer science / Applied mathematics / Randomness

Microsoft PowerPoint - no-waste

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:32
826Mathematics / Pseudorandom number generators / Permutations / Pseudorandomness / Key / Random permutation / Entropy / Symmetric-key algorithm / Cipher / Cryptography / Randomness / Applied mathematics

Microsoft PowerPoint - random1

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:32
827Cryptography / Randomness / Extractor / Pseudorandomness / Min-entropy / Leftover hash lemma / Entropy / Randomness extractor / Information theory / Applied mathematics / Theoretical computer science

April 25, 2013 Randomness in Cryptography Lecture 15: Privacy Amplification against Active Attackers Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
828Abstract algebra / Geometric topology / Differential topology / Differential geometry / Proof theory / Train track map / Stallings theorem about ends of groups / Geometric group theory / Geometry / Topology

Randomness in Cryptography January 24, 2013 Lecture 3: Privacy and Weak Sources Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2014-03-05 15:29:24
829Randomness / Computational complexity theory / Information theory / Pseudorandomness / Randomness extractor / Extractor / Leftover hash lemma / Random number generation / Entropy / Applied mathematics / Theoretical computer science / Cryptography

Microsoft PowerPoint - extractor-survey-teaching [Compatibility Mode]

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:27
830Game theory / Probability theory / Measurement / Uncertainty / Normal distribution / Risk / Probability distribution / Expected utility hypothesis / Randomness / Statistics / Probability and statistics / Probability interpretations

On the Unfortunate Problem of the Nonobservability of the Probability Distribution Nassim Nicholas Taleb and Avital Pilpel 1 TP

Add to Reading List

Source URL: www.fooledbyrandomness.com

Language: English - Date: 2011-07-09 18:45:36
UPDATE