Randomness

Results: 1720



#Item
551Probability theory / Probability and statistics / Randomness / Entropy / Statistical theory / Independence / Min-entropy / Conditioning / Mutual information / Information theory / Statistics / Mathematical analysis

An extended abstract of this paper is published in the proceedings of the 8th International Conference on Information-Theoretic Security—ICITSThis is the full version. The Chaining Lemma and its Application Ivan

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-18 05:36:30
552Mathematical optimization / Knowledge / Statistical randomness / Stochastic programming / Stochastic / Economic model / Sensitivity analysis / Control theory / Stochastic modelling / Operations research / Mathematics / Statistics

Energy Technology Systems Analysis Programme TIMES Version 3.3 User Note Stochastic Programming and Tradeoff Analysis in TIMES

Add to Reading List

Source URL: www.iea-etsap.org

Language: English - Date: 2012-01-11 23:54:31
553Information theory / Randomness / Multivariate normal distribution / Normal distribution / Entropy / Principal component analysis / Linear discriminant analysis / Multivariate random variable / Eigenvalues and eigenvectors / Statistics / Multivariate statistics / Singular value decomposition

Template Attacks on Different Devices Omar Choudary and Markus G. Kuhn Computer Laboratory, University of Cambridge, Cambridge, UK {omar.choudary,markus.kuhn}@cl.cam.ac.uk Abstract. Template attacks remain a most powerf

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-09-23 11:16:45
554Statistics / Probability interpretations / Cryptography / Randomness / Email spam / Uncertainty / Spam / Internet / Spamming / Computing

Struck by Lightning.qxd:10 PM

Add to Reading List

Source URL: probability.ca

Language: English - Date: 2013-12-10 08:33:58
555Physical Unclonable Function / Randomness / Electronics / Flip-flop / XOR gate / Arbiter / Exclusive or / Field-programmable gate array / Logic gates / Electronic engineering / Electrical engineering

Power and Timing Side Channels for PUFs and their Efficient Exploitation Ulrich R¨uhrmair, Xiaolin Xu, Jan S¨olter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne Burleson Abstract—We discuss the first power and timing sid

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 06:36:55
556Integrated circuits / Digital electronics / Physical Unclonable Function / Randomness / Field-programmable gate array / Placement / Place and route / Xilinx / Routing / Electronic engineering / Electronics / Electronic design automation

A Comparative Analysis of Delay Based PUF Implementations on FPGA Sergey Morozov, Abhranil Maiti, Patrick Schaumont, Virginia Polytechnic Institute and State University {morozovs, abhranil, schaum}@vt.edu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-19 15:05:40
557Mathematics / Probability and statistics / Cryptography / Randomness

“Struck by Lightning” Supplementary Materials Introductory small groups assignment Form a group by finding the person with the same card number as yours, in the suit CLUBS. Arrange your chairs so you can work well to

Add to Reading List

Source URL: probability.ca

Language: English - Date: 2011-03-02 16:34:36
558Analysis of algorithms / Randomness / Advantage / Randomized algorithm / Adversary model / Pseudorandomness / Transmission Control Protocol / Randomness extractor / Random number generation / Cryptography / Theoretical computer science / Applied mathematics

Authenticated Key Exchange under Bad Randomness? Guomin Yang1 , Shanshan Duan2 , Duncan S. Wong3 , Chik How Tan1 , and Huaxiong Wang4 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-18 22:21:28
559Sample / Random sample / Statistics / Sampling / Randomness

RTF Document

Add to Reading List

Source URL: abs.gov.au

Language: English - Date: 2014-08-14 21:34:26
560Computational complexity theory / Coding theory / Randomness / Randomness extractor / Extractor / Advantage / Ciphertext indistinguishability / Leftover hash lemma / Adversary model / Cryptography / Theoretical computer science / Applied mathematics

An extended abstract of this paper appears in the proceedings of the 11th ACM Conference on Computer and Communications Security—CCS 2004, Washington, DC, OctoberThis expanded version is available from the IACR

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-15 15:22:16
UPDATE