Sciweavers

PR
2016
65views Cryptology» more  PR 2016»
10 years 24 days ago
Can high-order dependencies improve mutual information based feature selection?
Mutual information (MI) based approaches are a popular paradigm for feature selection. Most previous methods have made use of low-dimensional MI quantities that are only effectiv...
Nguyen Xuan Vinh, Shuo Zhou, Jeffrey Chan, James B...
125
Voted
PR
2016
55views Cryptology» more  PR 2016»
10 years 24 days ago
Open-vocabulary recognition of machine-printed Arabic text using hidden Markov models
—In this paper, we present multi-font printed Arabic text recognition using hidden Markov models (HMMs). We propose a novel approach to the sliding window technique for feature e...
Irfan Ahmad, Sabri A. Mahmoud, Gernot A. Fink
PR
2016
61views Cryptology» more  PR 2016»
10 years 24 days ago
A continuous linear optimal transport approach for pattern analysis in image datasets
Soheil Kolouri, Akif Burak Tosun, John A. Ozolek, ...
PR
2016
70views Cryptology» more  PR 2016»
10 years 24 days ago
One-pass online learning: A local approach
Online learning is very important for processing sequential data and helps alleviate the computation burden on large scale data as well. Especially, one-pass online learning is to...
Zhaoze Zhou, Wei-Shi Zheng, Jianfang Hu, Yong Xu, ...
PQCRYPTO
2016
10 years 24 days ago
Post-Quantum Security Models for Authenticated Encryption
We propose a security model for evaluating the security of authenticated encryption schemes in the post-quantum setting. Our security model is based on a combination of the classic...
Vladimir Soukharev, David Jao, Srinath Seshadri
PQCRYPTO
2016
10 years 24 days ago
Vulnerabilities of "McEliece in the World of Escher"
Abstract. In 2014, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern bas...
Dustin Moody, Ray A. Perlner
PQCRYPTO
2016
10 years 24 days ago
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
Abstract. QC-MDPC McEliece attracted significant attention as promising alternative public-key encryption scheme believed to be resistant against quantum computing attacks. Compar...
Ingo von Maurich, Lukas Heberle, Tim Güneysu
PQCRYPTO
2016
10 years 24 days ago
Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems
This paper introduces a new central trapdoor for multivariate quadratic (MQ) public-key cryptosystems that allows for encryption, in contrast to time-tested MQ primitives such as U...
Alan Szepieniec, Jintai Ding, Bart Preneel
PKC
2016
Springer
76views Cryptology» more  PKC 2016»
10 years 24 days ago
Asynchronous Secure Multiparty Computation in Constant Time
In the setting of secure multiparty computation, a set of mutually distrusting parties wish to securely compute a joint function. It is well known that if the communication model ...
Ran Cohen