Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Entropic uncertainty relations and their applications
Heisenberg's uncertainty principle forms a fundamental element of quantum mechanics.
Uncertainty relations in terms of entropies were initially proposed to deal with conceptual …
Uncertainty relations in terms of entropies were initially proposed to deal with conceptual …
Quantum cryptography beyond quantum key distribution
Quantum cryptography is the art and science of exploiting quantum mechanical effects in
order to perform cryptographic tasks. While the most well-known example of this discipline is …
order to perform cryptographic tasks. While the most well-known example of this discipline is …
[LLIBRE][B] Introduction to cryptography
H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
System and methods to compensate for Doppler effects in multi-user (MU) multiple antenna systems (MAS)
A Forenza, SG Perlman - US Patent 9,312,929, 2016 - Google Patents
US9312929B2 - System and methods to compensate for Doppler effects in multi-user (MU)
multiple antenna systems (MAS) - Google Patents US9312929B2 - System and methods to …
multiple antenna systems (MAS) - Google Patents US9312929B2 - System and methods to …
Leakage-resilient cryptography
We construct a stream-cipher S whose implementation is secure even if a bounded amount
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …
of arbitrary (adversarially chosen) information on the internal state ofS is leaked during …
System and methods for planned evolution and obsolescence of multiuser spectrum
SG Perlman, A Forenza - US Patent 10,425,134, 2019 - Google Patents
URWAJWIAIPFPJE-YFMIWBNJSA-N sisomycin Chemical compound O1C
[C@@](O)(C)[C@ H](NC)[C@@ H](O)[C@ H] 1O [C@@ H] 1 [C@@ H](O)[C@ H](O [C …
[C@@](O)(C)[C@ H](NC)[C@@ H](O)[C@ H] 1O [C@@ H] 1 [C@@ H](O)[C@ H](O [C …
A survey of single-database private information retrieval: Techniques and applications
R Ostrovsky, WE Skeith III - International Workshop on Public Key …, 2007 - Springer
In this paper we survey the notion of Single-Database Private Information Retrieval (PIR).
The first Single-Database PIR was constructed in 1997 by Kushilevitz and Ostrovsky and …
The first Single-Database PIR was constructed in 1997 by Kushilevitz and Ostrovsky and …
Cryptography in the bounded-quantum-storage model
We initiate the study of two-party cryptographic primitives with unconditional security,
assuming that the adversary's quantum memory is of bounded size. We show that oblivious …
assuming that the adversary's quantum memory is of bounded size. We show that oblivious …
A leakage-resilient mode of operation
K Pietrzak - Annual International Conference on the Theory and …, 2009 - Springer
A weak pseudorandom function (wPRF) is a cryptographic primitive similar to–but weaker
than–a pseudorandom function: for wPRFs one only requires that the output is …
than–a pseudorandom function: for wPRFs one only requires that the output is …
Position based cryptography
We consider what constitutes identities in cryptography. Typical examples include your
name and your social-security number, or your fingerprint/iris-scan, or your address, or your …
name and your social-security number, or your fingerprint/iris-scan, or your address, or your …