Search

Your search keyword '"Pseudorandomness"' showing total 1,051 results

Search Constraints

Start Over You searched for: Descriptor "Pseudorandomness" Remove constraint Descriptor: "Pseudorandomness"
1,051 results on '"Pseudorandomness"'

Search Results

1. Variety Evasive Subspace Families.

2. POLYNOMIAL DATA STRUCTURE LOWER BOUNDS IN THE GROUP MODEL.

3. Limitations of the Impagliazzo–Nisan–Wigderson Pseudorandom Generator Against Permutation Branching Programs.

4. Optimal Rate List Decoding over Bounded Alphabets Using Algebraic-geometric Codes.

5. Bipartite Unique Neighbour Expanders via Ramanujan Graphs.

6. Pseudorandomness with Proof of Destruction and Applications

7. Arithmetic autocorrelation of binary m-sequences.

8. Arithmetic correlation of binary half‐ℓ‐sequences

9. TEST OF MEASURES OF PSEUDORANDOM BINARY SEQUENCES.

11. Codesign for Generation of Large Random Sequences on Zynq FPGA.

12. How Do the Arbiter PUFs Sample the Boolean Function Class?

13. Arithmetic correlation of binary half‐ℓ‐sequences.

14. On Pseudorandomness and Deep Learning: A Case Study.

15. Limitations of the Impagliazzo–Nisan–Wigderson Pseudorandom Generator Against Permutation Branching Programs

16. Pseudorandomness via the Discrete Fourier Transform

17. Eddystone-EID: Secure and Private Infrastructural Protocol for BLE Beacons.

18. Pseudorandom sequences derived from automatic sequences.

19. Stretching Demi-Bits and Nondeterministic-Secure Pseudorandomness

20. Polynomial-Time Pseudodeterministic Constructions (Invited Talk)

21. Efficient List-Decoding With Constant Alphabet and List Sizes.

22. On Pseudorandomness and Deep Learning: A Case Study

23. Optimal Rate Code Constructions for Computationally Simple Channels.

25. A Study of Pseudorandomness and its Applications to Coding Theory

26. Systematic Security Analysis of Stream Encryption With Key Erasure.

27. On an inequality between pseudorandom measures of lattices.

28. Weighted Measures of Pseudorandom Binary Lattices.

29. Maximum order complexity of the sum of digits function in Zeckendorf base and polynomial subsequences.

30. Naor-Reingold Goes Public: The Complexity of Known-Key Security

31. An Average-Case Lower Bound Against

32. Binary Sequences Derived From Differences of Consecutive Primitive Roots.

33. LIST-DECODING WITH DOUBLE SAMPLERS.

34. Explicit List-Decodable Codes with Optimal Rate for Computationally Bounded Channels.

35. CIRCUIT LOWER BOUNDS FOR NONDETERMINISTIC QUASI-POLYTIME FROM A NEW EASY WITNESS LEMMA.

36. An Invariance Principle for Polytopes.

37. Polylogarithmic Independence Fools AC0 Circuits.

38. From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice

39. Evolving Cryptographic Pseudorandom Number Generators

40. Extremal Sidon sets are Fourier uniform, with applications to partition regularity

41. De la teoria de grafs clàssica a l’anàlisi de les grans xarxes

42. Generative Models of Huge Objects

43. Linear Insertion Deletion Codes in the High-Noise and High-Rate Regimes

44. Transforming Pseudorandomness and Non-malleability with Minimal Overheads

45. Limits on the Pseudorandomness of Low-Degree Polynomials over the Integers

46. Entropy of Weight Distributions of Small-Bias Spaces and Pseudobinomiality

47. Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure

48. Error Correction by Structural Simplicity: Correcting Samplable Additive Errors.

49. Szemerédi's Theorem in the Primes.

50. A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations

Catalog

Books, media, physical & digital resources