Provable

Results: 110



#Item
81Skein / Threefish / Cryptographic hash functions / Block cipher / HMAC / Mihir Bellare / Hash function / Stefan Lucks / Cryptography / Hashing / NIST hash function competition

Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
82Giving / Social psychology / Buddhist meditation / Buddhist practices / Compassion / Emotions / Altruism / Mettā / Philip Zimbardo / Buddhism / Religion / Human behavior

© Ji m Di n e / S O DRAC[removed] ) The Science of Love Are there provable methods we can use to become more altruistic and compassionate? Can Buddhist compassion practices be adapted for a secular society?

Add to Reading List

Source URL: chademeng.com

Language: English - Date: 2010-04-24 13:41:31
83Cryptographic protocols / Internet protocols / Internet standards / Domain Name System Security Extensions / Public key certificate / X.509 / HTTP Secure / Cryptography / Public-key cryptography / Key management

Why Provable Transparency is Useful Against Surveillance Ben Laurie, Google (benl@google,com), 11 Jan 2014. Background Certificate Transparency (RFC 6962) is an example of a general mechanism which perm

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
84Support vector machine / Statistical classification / Transmission Control Protocol / Naive Bayes classifier

Effective Attacks and Provable Defenses for Website Fingerprinting Tao Wang1 , Xiang Cai2 , Rishab Nithyanand2 , Rob Johnson2 and Ian Goldberg1 1 University 2 Stony of Waterloo

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-03-19 07:19:19
85Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:33
86Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:36
87Matrix Chernoff bound / Combinatorics / Mathematics / Disjunct matrix

Submitted to the Annals of Statistics SUPPLEMENTARY MATERIAL FOR: HIGH-DIMENSIONAL REGRESSION WITH NOISY AND MISSING DATA: PROVABLE GUARANTEES WITH NON-CONVEXITY

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2013-02-28 06:29:26
88Formal sciences / Silvio Micali / Shafi Goldwasser / Charles Rackoff / Gödel Prize / Semantic security / Interactive proof system / ACM SIGACT / Provable security / Cryptography / Women in technology / Theoretical computer science

acm Association for Computing Machinery Advancing Computing as a Science & Profession Contact: Virginia Gold

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2013-05-21 15:34:04
89Applied mathematics / Pseudorandom generator theorem / Stream cipher / Pseudorandom generator / Block cipher / Hard-core predicate / Exponential distribution / SWIFFT / Cryptography / Theoretical computer science / Pseudorandomness

First Modes of Operation Workshop (October[removed]Key Feedback Mode: a Keystream Generator with Provable Security

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-07 12:35:35
90Physics / Systems theory / Theory of computation / Cellular automaton / A New Kind of Science / Digital physics / Stephen Wolfram / Rule 110 / Calculating Space / Wolfram Research / Cellular automata / Science

#!/usr/bin/env ghc[removed]the following error-provable roman czyborra space thesis ©©-by-sa [removed[removed]expresses that ‫ אל‬nature is governed by one tiny deterministic lex radicalis

Add to Reading List

Source URL: czyborra.com

Language: English - Date: 2013-11-15 05:36:17
UPDATE