Symmetric function

Results: 155



#Item
41Regression analysis / Probability and statistics / Matrices / Matrix / Normal distribution / Multivariate normal distribution / Least squares / Symmetric matrix / Statistics / Mathematical analysis / Mathematical optimization

g01 – Simple Calculations on Statistical Data g01nbc NAG C Library Function Document nag_moments_ratio_quad_forms (g01nbc)

Add to Reading List

Source URL: www.softintegration.com

Language: English - Date: 2004-10-25 19:49:07
42Group action / Group theory / Symmetry / Equivalence relation / Camera lens / Surjective function / Function / Mathematics / Mathematical analysis / Functions and mappings

Symmetric Lenses (Full version) Martin Hofmann Benjamin Pierce

Add to Reading List

Source URL: dmwit.com

Language: English - Date: 2010-08-11 18:17:21
43Operator theory / Quantum mechanics / Linear algebra / Singular value decomposition / Matrix theory / Eigenvalues and eigenvectors / Spin / Operator / Dirac delta function / Algebra / Physics / Mathematical analysis

CMI Ph.D. Phy solutionsa) V (x) = g(x2 − a2 )2 , a has the same dimension as x i.e., length and g has dimensions of energy ×L−4 or M T −2 L−2 . (b) It is a double well potential, symmetric about x = 0

Add to Reading List

Source URL: www.cmi.ac.in

Language: English - Date: 2014-09-01 03:15:43
44Key size / Message authentication code / Block cipher / Cryptographic hash function / Cryptography / Symmetric-key algorithm / Cipher

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
45Symmetric-key algorithm / Cryptographic hash function / Authenticated encryption / Cipher / Public-key cryptography / Random oracle / Cryptography / Encryption / Advanced Encryption Standard

ACISP 2015 Accepted papers Australasian Conference on Information Security and Privacy Queensland University of Technology, Gardens Point, Brisbane www.acisp2015.qut.edu.au Paper

Add to Reading List

Source URL: www.acisp2015.qut.edu.au

Language: English - Date: 2015-04-12 20:54:57
46Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
47Hashing / Symmetric-key algorithm / RC4 / RC5 / Block cipher / SHA-1 / Crypt / GOST / Cipher / Cryptography / Stream ciphers / Cryptographic hash function

Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:51
48XTR / Normal distribution / Mathematics / Statistical theory / Information theory / Mathematical analysis / Statistics / Beta function

Symmetric Tardos ngerprinting codes for arbitrary alphabet sizes  B. Skori c, S. Katzenbeisser, M.U. Celik

Add to Reading List

Source URL: members.home.nl

Language: English - Date: 2008-12-09 00:54:27
49Matrix theory / Matrices / Determinants / Circulant matrix / Numerical linear algebra / Matrix / Eigenvalues and eigenvectors / Theorems and definitions in linear algebra / Auxiliary function / Algebra / Linear algebra / Mathematics

On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks DU Yusong1 * , WEI Baodian2 , ZHANG Fangguo2 & ZHANG Huang2 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 18:34:47
50Finite fields / Stream ciphers / CBC-MAC / Block cipher / CMAC / Classical cipher / Keystream / Cryptographic hash function / Symmetric-key algorithm / Cryptography / Message authentication codes / Block cipher modes of operation

The Weakness of Integrity Protection for LTE Teng Wu and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, ON N2L 3G1, Canada {teng.wu, ggong}@uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 11:12:53
UPDATE