• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 647
  • 251
  • 64
  • 55
  • 45
  • 34
  • 20
  • 20
  • 20
  • 20
  • 20
  • 19
  • 10
  • 10
  • 10
  • Tagged with
  • 1367
  • 213
  • 180
  • 161
  • 130
  • 123
  • 113
  • 110
  • 98
  • 90
  • 87
  • 86
  • 85
  • 82
  • 82
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
351

NMR Dynamic Characterization of a Disordered Peptide Derived From the V3 Loop of HIV-1 Both Free and Conjugated With Bovine Pancreatic Trypsin Inhibitor

Sharma, Yugal K. January 2000 (has links)
No description available.
352

An Examination of Type I Errors and Power for Two Differential Item Functioning Indices

Clark, Patrick Carl, Jr. 28 October 2010 (has links)
No description available.
353

Quantum Resistant Authenticated Key Exchange from Ideal Lattices

Snook, Michael 03 October 2016 (has links)
No description available.
354

Fading multipath bias errors in global positioning system receiver tracking loops

Kelly, Joseph Michael January 2001 (has links)
No description available.
355

Ionospheric propagation delay errors for space-based users of the global positioning system

Beach, Theodore L. January 1988 (has links)
No description available.
356

Effects of correlated distance observations on the strength of a horizontal geodetic network

Malla, Rajendra Prakash January 1978 (has links)
No description available.
357

The Relationship Between Nurses' Work Hours, Fatigue, and Occurrence of Medication Administration Errors

Bellebaum, Katherine Louise 01 October 2008 (has links)
No description available.
358

The Effects of a Word Prediction Program on the Number of Words Written by a Learner with Disabilities

Ressa, Theodoto Wafula 15 January 2010 (has links)
No description available.
359

A Model to Predict Sun Gear Radial Orbit of a Planetary Gear Set having Manufacturing Errors

Banerjee, Anindo 29 August 2012 (has links)
No description available.
360

Reduction-Respecting Parameters for Lattice-Based Cryptosystems

Gates, Fletcher January 2018 (has links)
One attractive feature of lattice-based cryptosystems is the existence of security reductions relating the difficulty of breaking the cryptosystem to the difficulty of solving variants of the shortest vector problem (Regev, STOC 2005; Peikert, ePrint 2008). As there are no known polynomial-time algorithms which solve these lattice problems, this implies the asymptotic security of the cryptosystem. However, current lattice-based cryptosystems using the learning with errors (LWE) problem select parameters for which the reduction to the underlying lattice problem gives no meaningful assurance of concrete security. We analyze the runtime of the algorithm constructed in the reductions and select parameters for a cryptosystem under which the reductions give 128-bit security. While the resulting LWE-based cryptosystem is somewhat cumbersome, requiring a dimension of n = 1460, this is less than 2 times the dimension in the recently proposed Frodo cryptosystem (Bos et al., ACM CCS 2016), and could be implemented without catastrophic damage to communication times. We also investigate the runtime necessary for a reduction to give meaningful security assurances for current cryptosystems. / Thesis / Master of Science (MSc) / The advent of quantum computing poses a serious threat to modern cryptography, as most cryptosystems in use today are vulnerable to attacks by quantum algorithms. Recently proposed cryptosystems based on lattices are conjectured to be resistant to attacks by quantum computers. These cryptosystems also have a conditional security guarantee: if the cryptosystem can be broken by an attack, then a reduction exists which uses that attack to solve variants of the shortest vector problem (Regev, STOC 2005; Peikert, ePrint 2008). As these problems have no known efficient solutions, breaking the cryptosystem should be hard. However this guarantee only holds if the cryptosystem is constructed using parameters which satisfy conditions given in the reduction. Current proposals do not do this, and so cannot claim even a conditional security guarantee. We analyze two reductions and select parameters for a cryptosystem which satisfy these conditions. We also investigate the runtime necessary for a reduction to give meaningful security assurances for current cryptosystems.

Page generated in 0.032 seconds