Auswahl der wissenschaftlichen Literatur zum Thema „Oblivious sampling“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Oblivious sampling" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Oblivious sampling"
Zuckerman, David. „Randomness-optimal oblivious sampling“. Random Structures and Algorithms 11, Nr. 4 (Dezember 1997): 345–67. http://dx.doi.org/10.1002/(sici)1098-2418(199712)11:4<345::aid-rsa4>3.0.co;2-z.
Der volle Inhalt der QuelleBunn, Paul, und Rafail Ostrovsky. „Oblivious Sampling with Applications to Two-Party k-Means Clustering“. Journal of Cryptology 33, Nr. 3 (12.05.2020): 1362–403. http://dx.doi.org/10.1007/s00145-020-09349-w.
Der volle Inhalt der QuelleAgarwal, Mridul, Vaneet Aggarwal, Arnob Ghosh und Nilay Tiwari. „Reinforcement Learning for Mean-Field Game“. Algorithms 15, Nr. 3 (22.02.2022): 73. http://dx.doi.org/10.3390/a15030073.
Der volle Inhalt der QuelleNwaobilor, Stephen Ogbonna, und Sola Aluko-Arowolo. „Concurrent Use of Traditional and Orthodox Modes of Healthcare Services among Out-Patient Nursing Mothers in Ikenne Local Government Area, Ogun State, Nigeria“. International Journal of Current Research in the Humanities 26, Nr. 1 (25.02.2023): 337–48. http://dx.doi.org/10.4314/ijcrh.v26i1.20.
Der volle Inhalt der QuelleFaehrmann, Paul K., Mark Steudtner, Richard Kueng, Mária Kieferová und Jens Eisert. „Randomizing multi-product formulas for Hamiltonian simulation“. Quantum 6 (19.09.2022): 806. http://dx.doi.org/10.22331/q-2022-09-19-806.
Der volle Inhalt der QuelleAmeade, Evans Paul Kwame, Mohammed Ibrahim, Halimatu-Sadia Ibrahim, Rabiatu Hamisu Habib und Stephen Yao Gbedema. „Concurrent Use of Herbal and Orthodox Medicines among Residents of Tamale, Northern Ghana, Who Patronize Hospitals and Herbal Clinics“. Evidence-Based Complementary and Alternative Medicine 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/1289125.
Der volle Inhalt der QuelleAjayi, Ayodeji Olusola, und Tola Adeleke. „SOUNDSCAPE MAPPING OF AGODI PARK AND GARDENS, IBADAN SOUTHWESTERN NIGERIA“. Journal of Event, Tourism and Hospitality Studies 2 (23.12.2022): 150–76. http://dx.doi.org/10.32890/jeth2022.2.6.
Der volle Inhalt der QuelleOwusu, Edmund, Charles Kwoseh, Enoch Osekre, Emmanuel Duku, Barnabas Adongo und Eric Gyasi. „Fusarium Wilt Disease of Eggplant: Farmers’ Socio-Demographic Characteristics, Farming History, Awareness and Perception in Major Eggplant Growing Areas of Ghana“. University of Zambia Journal of Agricultural and Biomedical Sciences 7, Nr. 1 (30.03.2023): 46–67. http://dx.doi.org/10.53974/unza.jabs.7.1.1102.
Der volle Inhalt der QuelleHashim, Hazlaili Binti, Andy Lim Yee Chee, Yeo Sook Fern, Anushia Chelvarayan und Khairol Nizat Bin Lajis. „Financial Literacy: The Influencing Factors Among Youth“. International Journal of Creative Business and Management 1, Nr. 2 (31.08.2021): 1. http://dx.doi.org/10.31098/ijcbm.v1i2.5415.
Der volle Inhalt der QuelleOyeleye. „Use of Herbal Medicine by Rural Residents in Lagos, Nigeria“. West Africa Journal of Medicine 39, Nr. 5 (26.06.2022): 508–15. http://dx.doi.org/10.55891/wajm.v39i5.124.
Der volle Inhalt der QuelleDissertationen zum Thema "Oblivious sampling"
Fallahpour, Pouria. „Lattice-based cryptography in a quantum setting : security proofs and attacks“. Electronic Thesis or Diss., Lyon, École normale supérieure, 2024. http://www.theses.fr/2024ENSL0023.
Der volle Inhalt der QuelleThe rise of quantum machines poses both challenges and opportunities for cryptography. In particular, security proofs may require revisions due to adversaries' quantum capabilities. This thesis presents two contributions in this respect: a positive result and a negative one. The Fiat-Shamir transform with aborts is one of the major paradigms for designing post-quantum secure signature schemes. Part of this thesis consists of a detailed security analysis of this transform in the quantum random oracle model. It is worth noting that all previous works have neglected subtle details, jeopardizing the correctness of their proofs. Consequently, our security proof stands as the first of its kind that is correct. Moreover, we analyze the runtime and correctness of the signatures obtained from this transform. The learning with errors (LWE) problem has been extensively utilized to construct cryptographic schemes that are secure against quantum adversaries. A knowledge assumption of the LWE problem states that obliviously sampling an LWE instance, namely without knowing its underlying secret, is hard for all polynomial-time algorithms. One can use this assumption to prove the security of some succinct non-interactive arguments of knowledge (SNARKs). While it seems a hard task for classical algorithms, we demonstrate a quantum polynomial-time oblivious LWE sampler. Consequently, our sampler breaks the security analysis of the mentioned SNARKs in the quantum setting
Buchteile zum Thema "Oblivious sampling"
Lipmaa, Helger, Roberto Parisella und Janno Siim. „Algebraic Group Model with Oblivious Sampling“. In Theory of Cryptography, 363–92. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-48624-1_14.
Der volle Inhalt der QuelleWee, Hoeteck, und Daniel Wichs. „Candidate Obfuscation via Oblivious LWE Sampling“. In Lecture Notes in Computer Science, 127–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77883-5_5.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Oblivious sampling"
Fattal, David, Marco Fiorentino und Raymond G. Beausoleil. „A practical scheme for quantum oblivious transfer and private database sampling“. In Optical Engineering + Applications, herausgegeben von Ronald E. Meyers, Yanhua Shih und Keith S. Deacon. SPIE, 2008. http://dx.doi.org/10.1117/12.793715.
Der volle Inhalt der QuelleDebris-Alazard, Thomas, Pouria Fallahpour und Damien Stehlé. „Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs“. In STOC '24: 56th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3618260.3649766.
Der volle Inhalt der QuelleLi, Enhan, Wenhao Wu, Wang Zhaohua, Zhenyu Li und Jianwei Niu. „SAROS: A Self-Adaptive Routing Oblivious Sampling Method for Network-wide Heavy Hitter Detection“. In APNet 2024: The 8th Asia-Pacific Workshop on Networking. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3663408.3663429.
Der volle Inhalt der Quelle