Permutation

Results: 881



#Item
161

Enumeration and shape of 1324-avoiding permutations A permutation π ∈ Sn is said to avoid a pattern σ ∈ Sk if there is no increasing subsequence 1 ≤ i1 < · · · < ik ≤ n such that the subsequence (πi1 , . .

Add to Reading List

Source URL: mssi2015.files.wordpress.com

Language: English - Date: 2015-08-17 11:35:28
    162Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Zero-knowledge proof / Cryptographic hash function / Coin flipping / Universal composability / Cryptographic primitive / One-way function / Claw-free permutation / RSA

    Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-06-28 21:51:08
    163

    Likelihood-based Network Comparison Using Permutation Models Carter T. Butts Department of Sociology and Institute for Mathematical Behavioral Sciences

    Add to Reading List

    Source URL: vw.indiana.edu

    Language: English - Date: 2006-05-17 15:01:48
      164

      ´ LIST OF PUBLICATIONS OF GYULA KAROLYI I Research papers ´cs [1] Doubly transitive permutation groups with abelian stabilizers (with S.J. Kova

      Add to Reading List

      Source URL: www.cs.elte.hu

      Language: English - Date: 2013-03-19 02:52:48
        165

        Reduction in Lossiness of RSA Trapdoor Permutation Santanu Sarkar Chennai, India

        Add to Reading List

        Source URL: cse.iitkgp.ac.in

        Language: English - Date: 2013-10-16 11:27:05
          166Cryptography / Advantage / Block cipher / Pseudorandom permutation / Feistel cipher / Cardinal number / One-way compression function / Index of cryptography articles

          Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

          Add to Reading List

          Source URL: pub.ist.ac.at

          Language: English - Date: 2014-06-19 17:26:59
          167Algebra / Mathematics / Mathematical analysis / Mathematical physics / Symmetry / Integral transforms / Joseph Fourier / Fourier analysis / Symmetry in mathematics / Fourier transform / Permutation group / Permutation

          CCCG 2011, Toronto ON, August 10–12, 2011 A Fourier-Theoretic Approach for Inferring Symmetries Xiaoye Jiang∗ Jian Sun†

          Add to Reading List

          Source URL: geometry.stanford.edu

          Language: English - Date: 2011-06-28 20:53:14
          168

          Workshop Tutorial: Likelihood-based Network Comparison ∗ Using Permutation Models Carter T. Butts Department of Sociology and Institute for Mathematical Behavioral Sciences University of California, Irvine

          Add to Reading List

          Source URL: vw.indiana.edu

          Language: English - Date: 2006-04-16 09:06:42
            169Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

            How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

            Add to Reading List

            Source URL: www.anf.es

            Language: English - Date: 2014-05-12 07:16:17
            170

            Differential Trail Weights in AES-like Ciphers Using New Permutation Layers Christof Beierle Master’s Thesis. September 18, 2014. Chair for Embedded Security – Prof. Dr.-Ing. Christof Paar

            Add to Reading List

            Source URL: www.emsec.rub.de

            Language: English - Date: 2014-11-11 06:38:58
              UPDATE