Academic literature on the topic 'Oblivious sampling'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Oblivious sampling.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Oblivious sampling"
Zuckerman, David. "Randomness-optimal oblivious sampling." Random Structures and Algorithms 11, no. 4 (December 1997): 345–67. http://dx.doi.org/10.1002/(sici)1098-2418(199712)11:4<345::aid-rsa4>3.0.co;2-z.
Full textBunn, Paul, and Rafail Ostrovsky. "Oblivious Sampling with Applications to Two-Party k-Means Clustering." Journal of Cryptology 33, no. 3 (May 12, 2020): 1362–403. http://dx.doi.org/10.1007/s00145-020-09349-w.
Full textAgarwal, Mridul, Vaneet Aggarwal, Arnob Ghosh, and Nilay Tiwari. "Reinforcement Learning for Mean-Field Game." Algorithms 15, no. 3 (February 22, 2022): 73. http://dx.doi.org/10.3390/a15030073.
Full textNwaobilor, Stephen Ogbonna, and Sola Aluko-Arowolo. "Concurrent Use of Traditional and Orthodox Modes of Healthcare Services among Out-Patient Nursing Mothers in Ikenne Local Government Area, Ogun State, Nigeria." International Journal of Current Research in the Humanities 26, no. 1 (February 25, 2023): 337–48. http://dx.doi.org/10.4314/ijcrh.v26i1.20.
Full textFaehrmann, Paul K., Mark Steudtner, Richard Kueng, Mária Kieferová, and Jens Eisert. "Randomizing multi-product formulas for Hamiltonian simulation." Quantum 6 (September 19, 2022): 806. http://dx.doi.org/10.22331/q-2022-09-19-806.
Full textAmeade, Evans Paul Kwame, Mohammed Ibrahim, Halimatu-Sadia Ibrahim, Rabiatu Hamisu Habib, and Stephen Yao Gbedema. "Concurrent Use of Herbal and Orthodox Medicines among Residents of Tamale, Northern Ghana, Who Patronize Hospitals and Herbal Clinics." Evidence-Based Complementary and Alternative Medicine 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/1289125.
Full textAjayi, Ayodeji Olusola, and Tola Adeleke. "SOUNDSCAPE MAPPING OF AGODI PARK AND GARDENS, IBADAN SOUTHWESTERN NIGERIA." Journal of Event, Tourism and Hospitality Studies 2 (December 23, 2022): 150–76. http://dx.doi.org/10.32890/jeth2022.2.6.
Full textOwusu, Edmund, Charles Kwoseh, Enoch Osekre, Emmanuel Duku, Barnabas Adongo, and Eric Gyasi. "Fusarium Wilt Disease of Eggplant: Farmers’ Socio-Demographic Characteristics, Farming History, Awareness and Perception in Major Eggplant Growing Areas of Ghana." University of Zambia Journal of Agricultural and Biomedical Sciences 7, no. 1 (March 30, 2023): 46–67. http://dx.doi.org/10.53974/unza.jabs.7.1.1102.
Full textHashim, Hazlaili Binti, Andy Lim Yee Chee, Yeo Sook Fern, Anushia Chelvarayan, and Khairol Nizat Bin Lajis. "Financial Literacy: The Influencing Factors Among Youth." International Journal of Creative Business and Management 1, no. 2 (August 31, 2021): 1. http://dx.doi.org/10.31098/ijcbm.v1i2.5415.
Full textOyeleye. "Use of Herbal Medicine by Rural Residents in Lagos, Nigeria." West Africa Journal of Medicine 39, no. 5 (June 26, 2022): 508–15. http://dx.doi.org/10.55891/wajm.v39i5.124.
Full textDissertations / Theses on the topic "Oblivious sampling"
Fallahpour, Pouria. "Lattice-based cryptography in a quantum setting : security proofs and attacks." Electronic Thesis or Diss., Lyon, École normale supérieure, 2024. http://www.theses.fr/2024ENSL0023.
Full textThe rise of quantum machines poses both challenges and opportunities for cryptography. In particular, security proofs may require revisions due to adversaries' quantum capabilities. This thesis presents two contributions in this respect: a positive result and a negative one. The Fiat-Shamir transform with aborts is one of the major paradigms for designing post-quantum secure signature schemes. Part of this thesis consists of a detailed security analysis of this transform in the quantum random oracle model. It is worth noting that all previous works have neglected subtle details, jeopardizing the correctness of their proofs. Consequently, our security proof stands as the first of its kind that is correct. Moreover, we analyze the runtime and correctness of the signatures obtained from this transform. The learning with errors (LWE) problem has been extensively utilized to construct cryptographic schemes that are secure against quantum adversaries. A knowledge assumption of the LWE problem states that obliviously sampling an LWE instance, namely without knowing its underlying secret, is hard for all polynomial-time algorithms. One can use this assumption to prove the security of some succinct non-interactive arguments of knowledge (SNARKs). While it seems a hard task for classical algorithms, we demonstrate a quantum polynomial-time oblivious LWE sampler. Consequently, our sampler breaks the security analysis of the mentioned SNARKs in the quantum setting
Book chapters on the topic "Oblivious sampling"
Lipmaa, Helger, Roberto Parisella, and Janno Siim. "Algebraic Group Model with Oblivious Sampling." In Theory of Cryptography, 363–92. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-48624-1_14.
Full textWee, Hoeteck, and Daniel Wichs. "Candidate Obfuscation via Oblivious LWE Sampling." In Lecture Notes in Computer Science, 127–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77883-5_5.
Full textConference papers on the topic "Oblivious sampling"
Fattal, David, Marco Fiorentino, and Raymond G. Beausoleil. "A practical scheme for quantum oblivious transfer and private database sampling." In Optical Engineering + Applications, edited by Ronald E. Meyers, Yanhua Shih, and Keith S. Deacon. SPIE, 2008. http://dx.doi.org/10.1117/12.793715.
Full textDebris-Alazard, Thomas, Pouria Fallahpour, and Damien Stehlé. "Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs." In STOC '24: 56th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3618260.3649766.
Full textLi, Enhan, Wenhao Wu, Wang Zhaohua, Zhenyu Li, and Jianwei Niu. "SAROS: A Self-Adaptive Routing Oblivious Sampling Method for Network-wide Heavy Hitter Detection." In APNet 2024: The 8th Asia-Pacific Workshop on Networking. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3663408.3663429.
Full text