[LIBRO][B] Rainbow connections of graphs
X Li, Y Sun - 2012 - books.google.com
Rainbow connections are natural combinatorial measures that are used in applications to
secure the transfer of classified information between agencies in communication networks …
secure the transfer of classified information between agencies in communication networks …
Rainbow connections of graphs: A survey
X Li, Y Shi, Y Sun - Graphs and combinatorics, 2013 - Springer
The concept of rainbow connection was introduced by Chartrand et al.[14] in 2008. It is
interesting and recently quite a lot papers have been published about it. In this survey we …
interesting and recently quite a lot papers have been published about it. In this survey we …
Non-malleable codes from two-source extractors
We construct an efficient information-theoretically non-malleable code in the split-state
model for one-bit messages. Non-malleable codes were introduced recently by …
model for one-bit messages. Non-malleable codes were introduced recently by …
Non-malleable extractors and codes, with their many tampered extensions
Randomness extractors and error correcting codes are fundamental objects in computer
science. Recently, there have been several natural generalizations of these objects, in the …
science. Recently, there have been several natural generalizations of these objects, in the …
Exponential separation between shallow quantum circuits and unbounded fan-in shallow classical circuits
Recently, Bravyi, Gosset, and Konig (Science, 2018) exhibited a search problem called the
2D Hidden Linear Function (2D HLF) problem that can be solved exactly by a constant …
2D Hidden Linear Function (2D HLF) problem that can be solved exactly by a constant …
Leakage-resilient signatures
The strongest standard security notion for digital signature schemes is unforgeability under
chosen message attacks. In practice, however, this notion can be insufficient due to “side …
chosen message attacks. In practice, however, this notion can be insufficient due to “side …
An introduction to randomness extractors
R Shaltiel - International colloquium on automata, languages, and …, 2011 - Springer
We give an introduction to the area of “randomness extraction” and survey the main
concepts of this area: deterministic extractors, seeded extractors and multiple sources …
concepts of this area: deterministic extractors, seeded extractors and multiple sources …
FlexIO: I/O middleware for location-flexible scientific data analytics
Increasingly severe I/O bottlenecks on High-End Computing machines are prompting
scientists to process simulation output data online while simulations are running and before …
scientists to process simulation output data online while simulations are running and before …
Leakage-resilient storage
We study a problem of secure data storage on hardware that may leak information. We
introduce a new primitive, that we call leakage-resilient storage (LRS), which is an …
introduce a new primitive, that we call leakage-resilient storage (LRS), which is an …
How to refute a random CSP
Let P be a k-ary predicate over a finite alphabet. Consider a random CSP (P) instance I over
n variables with m constraints. When m≫ n the instance will be unsatisfiable with high …
n variables with m constraints. When m≫ n the instance will be unsatisfiable with high …