Sciweavers

3328 search results - page 6 / 666
» On Plateaued Functions and Their Constructions
Sort
View
PKC
2010
Springer
177views Cryptology» more  PKC 2010»
13 years 11 months ago
More Constructions of Lossy and Correlation-Secure Trapdoor Functions
We propose new and improved instantiations of lossy trapdoor functions (Peikert and Waters, STOC ’08), and correlation-secure trapdoor functions (Rosen and Segev, TCC ’09). Ou...
David Mandell Freeman, Oded Goldreich, Eike Kiltz,...
WAIFI
2007
Springer
122views Mathematics» more  WAIFI 2007»
14 years 1 months ago
The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions
The first APN polynomials EA-inequivalent to power functions have been constructed in [7, 8] by applying CCZ-equivalence to the Gold APN functions. It is a natural question wheth...
Lilya Budaghyan
ATAL
2010
Springer
13 years 8 months ago
Basis function construction for hierarchical reinforcement learning
This paper introduces an approach to automatic basis function construction for Hierarchical Reinforcement Learning (HRL) tasks. We describe some considerations that arise when con...
Sarah Osentoski, Sridhar Mahadevan
FC
2008
Springer
105views Cryptology» more  FC 2008»
13 years 9 months ago
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
Abstract. We consider general secure function evaluation (SFE) of private functions (PF-SFE). Recall, privacy of functions is often most efficiently achieved by general SFE [18,19,...
Vladimir Kolesnikov, Thomas Schneider 0003
DCC
2006
IEEE
14 years 7 months ago
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
So far there is no systematic attempt to construct Boolean functions with maximum annihilator immunity. In this paper we present a construction keeping in mind the basic theory of...
Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarka...