Gotowa bibliografia na temat „Oblivious sampling”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Oblivious sampling”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Oblivious sampling"
Zuckerman, David. "Randomness-optimal oblivious sampling". Random Structures and Algorithms 11, nr 4 (grudzień 1997): 345–67. http://dx.doi.org/10.1002/(sici)1098-2418(199712)11:4<345::aid-rsa4>3.0.co;2-z.
Pełny tekst źródłaBunn, Paul, i Rafail Ostrovsky. "Oblivious Sampling with Applications to Two-Party k-Means Clustering". Journal of Cryptology 33, nr 3 (12.05.2020): 1362–403. http://dx.doi.org/10.1007/s00145-020-09349-w.
Pełny tekst źródłaAgarwal, Mridul, Vaneet Aggarwal, Arnob Ghosh i Nilay Tiwari. "Reinforcement Learning for Mean-Field Game". Algorithms 15, nr 3 (22.02.2022): 73. http://dx.doi.org/10.3390/a15030073.
Pełny tekst źródłaNwaobilor, Stephen Ogbonna, i Sola Aluko-Arowolo. "Concurrent Use of Traditional and Orthodox Modes of Healthcare Services among Out-Patient Nursing Mothers in Ikenne Local Government Area, Ogun State, Nigeria". International Journal of Current Research in the Humanities 26, nr 1 (25.02.2023): 337–48. http://dx.doi.org/10.4314/ijcrh.v26i1.20.
Pełny tekst źródłaFaehrmann, Paul K., Mark Steudtner, Richard Kueng, Mária Kieferová i Jens Eisert. "Randomizing multi-product formulas for Hamiltonian simulation". Quantum 6 (19.09.2022): 806. http://dx.doi.org/10.22331/q-2022-09-19-806.
Pełny tekst źródłaAmeade, Evans Paul Kwame, Mohammed Ibrahim, Halimatu-Sadia Ibrahim, Rabiatu Hamisu Habib i Stephen Yao Gbedema. "Concurrent Use of Herbal and Orthodox Medicines among Residents of Tamale, Northern Ghana, Who Patronize Hospitals and Herbal Clinics". Evidence-Based Complementary and Alternative Medicine 2018 (2018): 1–8. http://dx.doi.org/10.1155/2018/1289125.
Pełny tekst źródłaAjayi, Ayodeji Olusola, i Tola Adeleke. "SOUNDSCAPE MAPPING OF AGODI PARK AND GARDENS, IBADAN SOUTHWESTERN NIGERIA". Journal of Event, Tourism and Hospitality Studies 2 (23.12.2022): 150–76. http://dx.doi.org/10.32890/jeth2022.2.6.
Pełny tekst źródłaOwusu, Edmund, Charles Kwoseh, Enoch Osekre, Emmanuel Duku, Barnabas Adongo i Eric Gyasi. "Fusarium Wilt Disease of Eggplant: Farmers’ Socio-Demographic Characteristics, Farming History, Awareness and Perception in Major Eggplant Growing Areas of Ghana". University of Zambia Journal of Agricultural and Biomedical Sciences 7, nr 1 (30.03.2023): 46–67. http://dx.doi.org/10.53974/unza.jabs.7.1.1102.
Pełny tekst źródłaHashim, Hazlaili Binti, Andy Lim Yee Chee, Yeo Sook Fern, Anushia Chelvarayan i Khairol Nizat Bin Lajis. "Financial Literacy: The Influencing Factors Among Youth". International Journal of Creative Business and Management 1, nr 2 (31.08.2021): 1. http://dx.doi.org/10.31098/ijcbm.v1i2.5415.
Pełny tekst źródłaOyeleye. "Use of Herbal Medicine by Rural Residents in Lagos, Nigeria". West Africa Journal of Medicine 39, nr 5 (26.06.2022): 508–15. http://dx.doi.org/10.55891/wajm.v39i5.124.
Pełny tekst źródłaRozprawy doktorskie na temat "Oblivious sampling"
Fallahpour, Pouria. "Lattice-based cryptography in a quantum setting : security proofs and attacks". Electronic Thesis or Diss., Lyon, École normale supérieure, 2024. http://www.theses.fr/2024ENSL0023.
Pełny tekst źródłaThe rise of quantum machines poses both challenges and opportunities for cryptography. In particular, security proofs may require revisions due to adversaries' quantum capabilities. This thesis presents two contributions in this respect: a positive result and a negative one. The Fiat-Shamir transform with aborts is one of the major paradigms for designing post-quantum secure signature schemes. Part of this thesis consists of a detailed security analysis of this transform in the quantum random oracle model. It is worth noting that all previous works have neglected subtle details, jeopardizing the correctness of their proofs. Consequently, our security proof stands as the first of its kind that is correct. Moreover, we analyze the runtime and correctness of the signatures obtained from this transform. The learning with errors (LWE) problem has been extensively utilized to construct cryptographic schemes that are secure against quantum adversaries. A knowledge assumption of the LWE problem states that obliviously sampling an LWE instance, namely without knowing its underlying secret, is hard for all polynomial-time algorithms. One can use this assumption to prove the security of some succinct non-interactive arguments of knowledge (SNARKs). While it seems a hard task for classical algorithms, we demonstrate a quantum polynomial-time oblivious LWE sampler. Consequently, our sampler breaks the security analysis of the mentioned SNARKs in the quantum setting
Części książek na temat "Oblivious sampling"
Lipmaa, Helger, Roberto Parisella i Janno Siim. "Algebraic Group Model with Oblivious Sampling". W Theory of Cryptography, 363–92. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-48624-1_14.
Pełny tekst źródłaWee, Hoeteck, i Daniel Wichs. "Candidate Obfuscation via Oblivious LWE Sampling". W Lecture Notes in Computer Science, 127–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77883-5_5.
Pełny tekst źródłaStreszczenia konferencji na temat "Oblivious sampling"
Fattal, David, Marco Fiorentino i Raymond G. Beausoleil. "A practical scheme for quantum oblivious transfer and private database sampling". W Optical Engineering + Applications, redaktorzy Ronald E. Meyers, Yanhua Shih i Keith S. Deacon. SPIE, 2008. http://dx.doi.org/10.1117/12.793715.
Pełny tekst źródłaDebris-Alazard, Thomas, Pouria Fallahpour i Damien Stehlé. "Quantum Oblivious LWE Sampling and Insecurity of Standard Model Lattice-Based SNARKs". W STOC '24: 56th Annual ACM Symposium on Theory of Computing. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3618260.3649766.
Pełny tekst źródłaLi, Enhan, Wenhao Wu, Wang Zhaohua, Zhenyu Li i Jianwei Niu. "SAROS: A Self-Adaptive Routing Oblivious Sampling Method for Network-wide Heavy Hitter Detection". W APNet 2024: The 8th Asia-Pacific Workshop on Networking. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3663408.3663429.
Pełny tekst źródła