搜索结果: 1-15 共查到“randomization”相关记录25条 . 查询时间(0.109 秒)
On Kilian's Randomization of Multilinear Map Encodings
Multilinear maps key-exchange Approximate-GCD problem
2018/11/29
Indistinguishability obfuscation constructions based on matrix branching programs generally proceed in two steps: first apply Kilian's randomization of the matrix product computation, and then encode ...
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
cryptographic protocols Nonce Randomization
2018/11/5
Multi-user (mu) security considers large-scale attackers (e.g., state actors) that given access to a number of sessions, attempt to compromise {\em at least} one of them. Mu security of authenticated ...
The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage
efficiently searchable encryption encrypted databases
2017/11/13
Efficiently searchable and easily deployable encryption schemes enable an untrusted, legacy service such as a relational database engine to perform searches over encrypted data. The ease with which su...
Assessing the causal role of adiposity on disordered eating in childhood, adolescence, and adulthood: a Mendelian randomization analysis
ALSPAC BMI disordered eating early life Mendelian randomization
2018/11/16
Background: Observational studies have shown that higher body mass index (BMI) is associated with increased risk of developing disordered eating patterns. However, the causal direction of this relatio...
Revisiting the Wrong-Key-Randomization Hypothesis
linear cryptanalysis wrong-key-randomization hypothesis success probability
2016/12/8
Linear cryptanalysis can be considered to be one of the
strongest techniques in the cryptanalyst’s arsenal. In most cases, Matsui’s
Algorithm 2 is used for the key recovery part of the attack. The s...
Health economics and health insurance aspects of Mendelian randomization
Health economics health insurance aspect Mendelian randomization
2018/12/19
We read with great interest the excellent paper of Haycock et al. (1) on the design, analysis, and interpretation of Mendelian randomization (MR) studies. We agree with the authors’ conclusions that t...
T-Proof: Secure Communication via Non-Algorithmic Randomization
identity theft non-repeat identification dialogue
2016/5/20
shared random strings are either communicated or recreated algorithmically in “pseudo” mode, thereby exhibiting innate vulnerability. Proposing a secure protocol based on unshared randomized data, whi...
Groth-Sahai Proofs Revisited Again: A Bug in Randomization
Non-interactive proof systems the Groth-Sahai proof system symmetric bilinear groups
2016/5/20
We revisit randomization of the prover in the GS proof system. We find an unnoticed bug in the ``optimized'' randomization in the symmetric bilinear setting with several assumptions, say, the DLIN ass...
Best (but oft-forgotten) practices: the design, analysis, and interpretation of Mendelian randomization studies
Mendelian randomization causality reverse causation confounding observational epidemiology evidence synthesis
2018/11/28
Mendelian randomization (MR) is an increasingly important tool for appraising causality in observational epidemiology. The technique exploits the principle that genotypes are not generally susceptible...
Is there a causal role for homocysteine concentration in blood pressure? A Mendelian randomization study
blood pressure cohort studies homocysteine Mendelian randomization molecular epidemiology
2018/11/23
Background: An understanding of whether homocysteine is a cause or a marker of increased blood pressure is relevant because blood homocysteine can be effectively lowered by safe and inexpensive interv...
Randomization,Endogeneity and Laboratory Experiments:The Role of Cash Balances in Private Value Auctions
Randomization Endogeneity Laboratory Experiments Cash Balances Private Value Auctions
2015/9/18
From a theoretical perspective, cash balances are thought to play a role in common value auctions because of limited liability. However, they have also been found to be important in common value aucti...
On the Effectiveness of Address-Space Randomization
Address-Space Randomization running code
2015/8/5
Address-space randomization is a technique used to fortify systems against buffer overflow attacks. The idea is to introduce artificial diversity by randomizing the memory location of certain system c...
Gray codes for randomization procedurse.
In this paper we consider the problem of secret sharing where shares are encrypted using a public-key encryption (PKE) scheme and ciphertexts are publicly available. While intuition tells us that the ...
Effects of randomization versus pre-orientation of subjects for the prediction of maximum oxygen uptake using the twelve minutes run test
FIELD TEST PERFORMANCE PEER RELATIONSHIP
2014/3/9
Aim: To compare the results from twelve minutes run test (12-MRT) when subjects run singly with those obtained when subjects run in randomized groups and in pre oriented groups. Methods: 33 subjects p...