搜索结果: 1-7 共查到“军事学 streaming”相关记录7条 . 查询时间(0.109 秒)
On the Streaming Indistinguishability of a Random Permutation and a Random Function
Streaming algorithm time-memory tradeoff switching lemma
2019/4/23
An adversary with SS bits of memory obtains a stream of QQ elements that are uniformly drawn from the set {1,2,…,N}{1,2,…,N}, either with or without replacement. This corresponds to sampling QQ elemen...
Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering
non-malleable codes streaming
2017/11/3
We show a general framework for constructing non-malleable codes against tampering families with average-case hardness bounds. Our framework adapts ideas from the Naor-Yung double encryption paradigm ...
Differentially Private Linear Algebra in the Streaming Model
Differential Privacy Linear Algebra Random Projection
2016/1/7
The focus of this paper is a systematic study of differential privacy on streaming data using sketchbased
algorithms. Previous works, like Dwork et al. (ICS 2010, STOC 2010), explored random sampling...
Nearly Optimal Verifiable Data Streaming (Full Version)
cryptographic protocols verifiable data streaming
2015/12/31
The problem of verifiable data streaming (VDS) considers a client with limited computational
and storage capacities that streams an a-priori unknown number of elements to an untrusted
server. The cl...
In a {verifiable data streaming} protocol, the client streams a long string to the server who stores it in its database. The stream is verifiable in the sense that the server can neither change the or...
The Mundja Streaming MAC
Mundja Streaming MAC
2009/3/31
Mundja is a MAC generation algorithm that has been designed for use
together with a stream cipher. Mundja accumulates the message onto two independent
registers: the first is a Cyclic Redundancy Che...
Private Searching On Streaming Data
Code Obfuscation Public Key Program Obfuscation Program Obfuscation
2009/2/19
In this paper, we consider the problem of private searching on streaming data, where we
can efficiently implement searching for documents that satisfy a secret criteria (such as presence or absence o...