搜索结果: 1-5 共查到“军队指挥学 k-ary C”相关记录5条 . 查询时间(0.046 秒)
Recently, an article by Felke appeared in Cryptography and Communications discussing the security of biquadratic C* and a further generalization, k-ary C*. The article derives lower bounds for the com...
Actively Secure OT-Extension from q-ary Linear Codes
cryptographic protocols oblivious transfer
2018/6/19
We consider recent constructions of 11-out-of-NN OT-extension from Kolesnikov and Kumaresan (CRYPTO 2013) and from Orrú et al. (CT-RSA 2017), based on binary error-correcting codes. We generalize thei...
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
Cloud storage Access pattern privacy Oblivious RAM
2016/1/8
This paper proposes KT-ORAM, a new hybrid ORAM-PIR construction, to protect a client's access pattern to outsourced data. KT-ORAM organizes the server storage as a k-ary tree with each node acting as ...
Some results concerning global avalanche characteristics of two $q$-ary functions
functions avalanche characteristics
2014/3/7
The global avalanche characteristics criteria was first introduced by Zhou et al. (Inform. Sci. 180(2) (2010) 256-265). This article is concerned with some new bounds on global avalanche characteristi...
A Family of p-ary Binomial Bent Functions
p-ary Binomial Bent functions Exponential sum Hamming weight
2009/12/29
The necessary and sufficient conditions of fa,b(x) being Bent are established
respectively by an exponential sum and two sequences related
to a and b. For the special case of p = 3, we further chara...