351 |
NMR Dynamic Characterization of a Disordered Peptide Derived From the V3 Loop of HIV-1 Both Free and Conjugated With Bovine Pancreatic Trypsin InhibitorSharma, Yugal K. January 2000 (has links)
No description available.
|
352 |
An Examination of Type I Errors and Power for Two Differential Item Functioning IndicesClark, Patrick Carl, Jr. 28 October 2010 (has links)
No description available.
|
353 |
Quantum Resistant Authenticated Key Exchange from Ideal LatticesSnook, Michael 03 October 2016 (has links)
No description available.
|
354 |
Fading multipath bias errors in global positioning system receiver tracking loopsKelly, Joseph Michael January 2001 (has links)
No description available.
|
355 |
Ionospheric propagation delay errors for space-based users of the global positioning systemBeach, Theodore L. January 1988 (has links)
No description available.
|
356 |
Effects of correlated distance observations on the strength of a horizontal geodetic networkMalla, Rajendra Prakash January 1978 (has links)
No description available.
|
357 |
The Relationship Between Nurses' Work Hours, Fatigue, and Occurrence of Medication Administration ErrorsBellebaum, Katherine Louise 01 October 2008 (has links)
No description available.
|
358 |
The Effects of a Word Prediction Program on the Number of Words Written by a Learner with DisabilitiesRessa, Theodoto Wafula 15 January 2010 (has links)
No description available.
|
359 |
A Model to Predict Sun Gear Radial Orbit of a Planetary Gear Set having Manufacturing ErrorsBanerjee, Anindo 29 August 2012 (has links)
No description available.
|
360 |
Reduction-Respecting Parameters for Lattice-Based CryptosystemsGates, Fletcher January 2018 (has links)
One attractive feature of lattice-based cryptosystems is the existence of security reductions relating the difficulty of breaking the cryptosystem to the difficulty of solving variants of the shortest vector problem (Regev, STOC 2005; Peikert, ePrint 2008). As there are no known polynomial-time algorithms which solve these lattice problems, this implies the asymptotic security of the cryptosystem. However, current lattice-based cryptosystems using the learning with errors (LWE) problem select parameters for which the reduction to the underlying lattice problem gives no meaningful assurance of concrete security. We analyze the runtime of the algorithm constructed in the reductions and select parameters for a cryptosystem under which the reductions give 128-bit security. While the resulting LWE-based cryptosystem is somewhat cumbersome, requiring a dimension of n = 1460, this is less than 2 times the dimension in the recently proposed Frodo cryptosystem (Bos et al., ACM CCS 2016), and could be implemented without catastrophic damage to communication times. We also investigate the runtime necessary for a reduction to give meaningful security assurances for current cryptosystems. / Thesis / Master of Science (MSc) / The advent of quantum computing poses a serious threat to modern cryptography, as most cryptosystems in use today are vulnerable to attacks by quantum algorithms. Recently proposed cryptosystems based on lattices are conjectured to be resistant to attacks by quantum computers. These cryptosystems also have a conditional security guarantee: if the cryptosystem can be broken by an attack, then a reduction exists which uses that attack to solve variants of the shortest vector problem (Regev, STOC 2005; Peikert, ePrint 2008). As these problems have no known efficient solutions, breaking the cryptosystem should be hard. However this guarantee only holds if the cryptosystem is constructed using parameters which satisfy conditions given in the reduction. Current proposals do not do this, and so cannot claim even a conditional security guarantee. We analyze two reductions and select parameters for a cryptosystem which satisfy these conditions. We also investigate the runtime necessary for a reduction to give meaningful security assurances for current cryptosystems.
|
Page generated in 0.032 seconds