Sciweavers

290 search results - page 20 / 58
» Pseudorandom Bits for Polynomials
Sort
View
ANSS
2005
IEEE
14 years 3 months ago
The Bubble Bit Technique as Improvement of HDL-Based Quantum Circuits Simulation
When performed on a classical computer, the simulation of quantum circuits is usually an exponential job. The methodology based on Hardware Description Languages is able to isolat...
Mihai Udrescu, Lucian Prodan, Mircea Vladutiu
GECCO
2003
Springer
123views Optimization» more  GECCO 2003»
14 years 3 months ago
Analysis of the (1+1) EA for a Dynamically Bitwise Changing OneMax
Abstract. Although evolutionary algorithms (EAs) are often successfully used for the optimization of dynamically changing objective function, there are only very few theoretical re...
Stefan Droste
FSE
2005
Springer
84views Cryptology» more  FSE 2005»
14 years 3 months ago
Some Attacks on the Bit-Search Generator
The bit-search generator (BSG) was proposed in 2004 and can be seen as a variant of the shrinking and self-shrinking generators. It has the advantage that it works at rate 1/3 usin...
Martin Hell, Thomas Johansson
CRYPTO
2009
Springer
82views Cryptology» more  CRYPTO 2009»
14 years 4 months ago
Solving Hidden Number Problem with One Bit Oracle and Advice
In the Hidden Number Problem (HNP), the goal is to find a hidden number s, when given p, g and access to an oracle that on query a returns the k most significant bits of s · ga ...
Adi Akavia
ESORICS
2008
Springer
13 years 11 months ago
Termination-Insensitive Noninterference Leaks More Than Just a Bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of informa...
Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, D...