Symmetric function

Results: 155



#Item
1

3814 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Since the two rate regions are now symmetric (see Fig. 4), the second constraint becomes equality. This expresses  as a function of a, and

Add to Reading List

Source URL: www.winlab.rutgers.edu

Language: English - Date: 2008-01-29 12:19:26
    2

    Practice Questions for Exam 1 (Crypto Basics) Question 1-Crypto: Recall that a symmetric-key cryptosystem consists of three functions: a key generator G, an encryption function E, and a decryption function D. For any pai

    Add to Reading List

    Source URL: zoo.cs.yale.edu

    - Date: 2013-10-07 23:40:04
      3Mathematics / Abstract algebra / Algebra / Analytic number theory / Bernhard Riemann / Riemann zeta function / Lattice

      425 Documenta Math. Volumes of Symmetric Spaces via Lattice Points Henri Gillet and Daniel R. Grayson

      Add to Reading List

      Source URL: documenta.sagemath.org

      Language: English - Date: 2006-12-21 17:41:44
      4Mathematical analysis / Generalized functions / Digital signal processing / Dirac delta function / Fourier analysis / Measure theory / Continuous function / Distribution

      Derivatives of self-intersection local times Jay Rosen∗ Abstract We show that the renormalized self-intersection local time γt (x) for the Brownian motion and symmetric stable process in R1 is differentiable in the sp

      Add to Reading List

      Source URL: www.math.csi.cuny.edu

      Language: English - Date: 2003-10-27 20:58:35
      5Mathematical analysis / Mathematics / Fourier analysis / Digital signal processing / Dirac delta function / Measure theory / Fourier transform / Holomorphic functional calculus / Differential forms on a Riemann surface

      Krein’s Strings, the Symmetric Moment Problem, and Extending a Real Positive Definite Function URI KEICH California Institute of Technology Abstract The symmetric moment problem is to find a possibly unique, positive s

      Add to Reading List

      Source URL: www.maths.usyd.edu.au

      Language: English - Date: 1999-10-18 14:35:21
      6Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

      An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2007-08-20 03:23:28
      7Game theory / Nash equilibrium / Strategy / Normal-form game / Global game / Supermodular function / Symmetric game / Strategic complements

      CHARACTERISING EQUILIBRIUM SELECTION IN GLOBAL GAMES WITH STRATEGIC COMPLEMENTARITIES CHRISTIAN BASTECK*,◦ ◦ ¨ •

      Add to Reading List

      Source URL: www.macroeconomics.tu-berlin.de

      Language: English - Date: 2013-10-21 03:26:58
      8Game theory / Mathematics / Supermodular function / Z1 / Nash equilibrium / Z2 / Symmetric game / Structure / Abstraction

      EVERY SYMMETRIC 3 × 3 GLOBAL GAME OF STRATEGIC COMPLEMENTARITIES HAS NOISE-INDEPENDENT SELECTION CHRISTIAN BASTECK Technische Universit¨at Berlin, Department of Macroeconomics

      Add to Reading List

      Source URL: www.macroeconomics.tu-berlin.de

      Language: English - Date: 2011-12-14 05:49:53
      9Graph theory / Mathematics / Submodular set function / Graph coloring / Spanning tree / Combinatorial optimization

      Minimization of Symmetric Submodular Functions under Hereditary Constraints J.A. Soto (joint work with M. Goemans) DIM, Univ. de Chile

      Add to Reading List

      Source URL: www.dim.uchile.cl

      Language: English - Date: 2013-08-08 17:44:20
      10Cryptography / Applied mathematics / Block cipher / Cryptographic hash function / Symmetric-key algorithm / Cryptanalysis / Public-key cryptography / Stream cipher / Cipher / Hash function / Tiny Encryption Algorithm / Index of cryptography articles

      An introduction to Cryptology1/ — EMA, Franceville, Gabon Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest Institut de Mathématiques de Bordeaux

      Add to Reading List

      Source URL: www.normalesup.org

      Language: English - Date: 2015-03-29 16:43:02
      UPDATE