Sciweavers

PR
2016
65views Cryptology» more  PR 2016»
8 years 7 months ago
Can high-order dependencies improve mutual information based feature selection?
Mutual information (MI) based approaches are a popular paradigm for feature selection. Most previous methods have made use of low-dimensional MI quantities that are only effectiv...
Nguyen Xuan Vinh, Shuo Zhou, Jeffrey Chan, James B...
PR
2016
55views Cryptology» more  PR 2016»
8 years 7 months ago
Open-vocabulary recognition of machine-printed Arabic text using hidden Markov models
—In this paper, we present multi-font printed Arabic text recognition using hidden Markov models (HMMs). We propose a novel approach to the sliding window technique for feature e...
Irfan Ahmad, Sabri A. Mahmoud, Gernot A. Fink
PR
2016
70views Cryptology» more  PR 2016»
8 years 7 months ago
One-pass online learning: A local approach
Online learning is very important for processing sequential data and helps alleviate the computation burden on large scale data as well. Especially, one-pass online learning is to...
Zhaoze Zhou, Wei-Shi Zheng, Jianfang Hu, Yong Xu, ...
PQCRYPTO
2016
8 years 7 months ago
Post-Quantum Security Models for Authenticated Encryption
We propose a security model for evaluating the security of authenticated encryption schemes in the post-quantum setting. Our security model is based on a combination of the classic...
Vladimir Soukharev, David Jao, Srinath Seshadri
PQCRYPTO
2016
8 years 7 months ago
Vulnerabilities of "McEliece in the World of Escher"
Abstract. In 2014, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern bas...
Dustin Moody, Ray A. Perlner
PQCRYPTO
2016
8 years 7 months ago
IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
Abstract. QC-MDPC McEliece attracted significant attention as promising alternative public-key encryption scheme believed to be resistant against quantum computing attacks. Compar...
Ingo von Maurich, Lukas Heberle, Tim Güneysu
PQCRYPTO
2016
8 years 7 months ago
Extension Field Cancellation: A New Central Trapdoor for Multivariate Quadratic Systems
This paper introduces a new central trapdoor for multivariate quadratic (MQ) public-key cryptosystems that allows for encryption, in contrast to time-tested MQ primitives such as U...
Alan Szepieniec, Jintai Ding, Bart Preneel
PKC
2016
Springer
76views Cryptology» more  PKC 2016»
8 years 7 months ago
Asynchronous Secure Multiparty Computation in Constant Time
In the setting of secure multiparty computation, a set of mutually distrusting parties wish to securely compute a joint function. It is well known that if the communication model ...
Ran Cohen