Art
J-GLOBAL ID:201902280189681659   Reference number:19A0914735

Numerical and Non-Asymptotic Analysis of Elias’s and Peres’s Extractors with Finite Input Sequences

有限入力シーケンスによるEliasおよびPeresの抽出器の数値的および非漸近的解析【JST・京大機械翻訳】
Author (3):
Material:
Volume: 20  Issue: 10  Page: 729  Publication year: 2018 
JST Material Number: U7179A  ISSN: 1099-4300  Document type: Article
Article type: 原著論文  Country of issue: Switzerland (CHE)  Language: ENGLISH (EN)
Abstract/Point:
Abstract/Point
Japanese summary of the article(about several hundred characters).
All summary is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
Many cryptographic systems req...
   To see more with JDream III (charged).   {{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=19A0914735&from=J-GLOBAL&jstjournalNo=U7179A") }}
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
, 【Automatic Indexing@JST】
Author keywords (4):
JST classification (2):
JST classification
Category name(code) classified by JST.
Quantum theory in general  ,  Quantum optics in general 
Reference (22):
  • Heninger, N.; Durumeric, Z.; Wustrow, E.; Halderman, J.A. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. In Proceedings of the 21st USENIX Security Symposium, Bellevue, WA, USA, 8-10 August 2012.
  • Lenstra, A.K.; Hughes, J.P.; Augier, M.; Bos, J.W.; Kleinjung, T.; Wachter, C. Public Keys. In Advances in Cryptology-ECRYPTO 2012; Safavi-Naini, R., Canetti, R., Eds.; Number 7417 in Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2012; pp. 626-642.
  • Bendel, M. Hackers Describe PS3 Security As Epic Fail, Gain Unrestricted Access. Available online: Exophase.com (accessed on 20 September 2018).
  • Dorrendorf, L.; Gutterman, Z.; Pinkas, B. Cryptanalysis of the Random Number Generator of the Windows Operating System. ACM Trans. Inf. Syst. Secur. 2009, 13, 10.
  • Bonneau, J.; Clark, J.; Goldfeder, S. On Bitcoin as a public randomness source. IACR Cryptol. ePrint Arch. 2015, 2015, 1015.
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page