نتایج جستجو برای: preserving zero product

تعداد نتایج: 472849  

Journal: :IACR Cryptology ePrint Archive 2014
Dan Boneh David J. Wu Joe Zimmerman

In recent work Cheon, Han, Lee, Ryu, and Stehlé presented an attack on the multilinear map of Coron, Lepoint, and Tibouchi (CLT). They show that given many low-level encodings of zero, the CLT multilinear map can be completely broken, recovering the secret factorization of the CLT modulus. The attack is a generalization of the “zeroizing” attack of Garg, Gentry, and Halevi. We first strengthen ...

2007
MÁRIO BESSA

We study the dynamical behaviour of Hamiltonian flows defined on 4-dimensional compact symplectic manifolds. We find the existence of a C-residual set of Hamiltonians for which every regular energy surface is either Anosov or it is in the closure of energy surfaces with zero Lyapunov exponents a.e. This is in the spirit of the Bochi-Mañé dichotomy for area-preserving diffeomorphisms on compact ...

2014
Smita Patel Sanjay Tiwari

--Zero Knowledge Proof is one of the classical construct that acts as cryptographic primitive in basic multiparty protocols implementing identification schemes and secure computation. A few recent results that convert protocols working in semi-honest models to malicious models using interactive zero knowledge proofs and research on protocol implementing zero knowledge proofs in multiparty envir...

2006
Chuang-yin Dang C. Y. DANG

A mapping f : Z → R is said to possess the direction preserving property if fi(x) > 0 implies fi(y) ≥ 0 for any integer points x and y with ‖x − y‖∞ ≤ 1. In this paper, a simplicial algorithm is developed for computing an integer zero point of a mapping with the direction preserving property. We assume that there is an integer point x with c ≤ x ≤ d satisfying that max1≤i≤n(xi − x 0 i )fi(x) > ...

Journal: :Applied Artificial Intelligence 2023

The urgent and indispensable requirement for secure efficient remote work compels organizations to reconsider their approach safeguarding themselves against cyber threats. shift toward amplifies the need redirect more network traffic cloud-based applications rather than relying solely on internal network. growing adoption of hybrid model necessitates system administrators increasingly provide a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید