scholarly journals Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function

Author(s):  
Thierry Mefenza ◽  
Damien Vergnaud
2016 ◽  
Vol E99.B (9) ◽  
pp. 2108-2111
Author(s):  
Minkyu KIM ◽  
Je HONG PARK ◽  
Dongyoung ROH

2015 ◽  
Vol E98.B (7) ◽  
pp. 1276-1283 ◽  
Author(s):  
Nam-Su JHO ◽  
Ku-Young CHANG ◽  
Do-Won HONG

Author(s):  
Satvir Singh

Steganography is the special art of hidding important and confidential information in appropriate multimedia carrier. It also restrict the detection of  hidden messages. In this paper we proposes steganographic method based on dct and entropy thresholding technique. The steganographic algorithm uses random function in order to select block of the image where the elements of the binary sequence of a secret message will be inserted. Insertion takes place at the lower frequency  AC coefficients of the  block. Before we insert the secret  message. Image under goes dc transformations after insertion of the secret message we apply inverse dc transformations. Secret message will only be inserted into a particular block if  entropy value of that particular block is greater then threshold value of the entropy and if block is selected by the random function. In  Experimental work we calculated the peak signal to noise ratio(PSNR), Absolute difference , Relative entropy. Proposed algorithm give high value of PSNR  and low value of Absolute difference which clearly indicate level of distortion in image due to insertion of secret message is reduced. Also value of  relative entropy is close to zero which clearly indicate proposed algorithm is sufficiently secure. 


2019 ◽  
Vol 2019 ◽  
pp. 1-15
Author(s):  
Muhua Liu ◽  
Ping Zhang ◽  
Qingtao Wu

Constrained verifiable random functions (VRFs) were introduced by Fuchsbauer. In a constrained VRF, one can drive a constrained key skS from the master secret key sk, where S is a subset of the domain. Using the constrained key skS, one can compute function values at points which are not in the set S. The security of constrained VRFs requires that the VRFs’ output should be indistinguishable from a random value in the range. They showed how to construct constrained VRFs for the bit-fixing class and the circuit constrained class based on multilinear maps. Their construction can only achieve selective security where an attacker must declare which point he will attack at the beginning of experiment. In this work, we propose a novel construction for constrained verifiable random function from bilinear maps and prove that it satisfies a new security definition which is stronger than the selective security. We call it semiadaptive security where the attacker is allowed to make the evaluation queries before it outputs the challenge point. It can immediately get that if a scheme satisfied semiadaptive security, and it must satisfy selective security.


Author(s):  
Moritz Moeller ◽  
Tino Ullrich

AbstractIn this paper we study $$L_2$$ L 2 -norm sampling discretization and sampling recovery of complex-valued functions in RKHS on $$D \subset \mathbb {R}^d$$ D ⊂ R d based on random function samples. We only assume the finite trace of the kernel (Hilbert–Schmidt embedding into $$L_2$$ L 2 ) and provide several concrete estimates with precise constants for the corresponding worst-case errors. In general, our analysis does not need any additional assumptions and also includes the case of non-Mercer kernels and also non-separable RKHS. The fail probability is controlled and decays polynomially in n, the number of samples. Under the mild additional assumption of separability we observe improved rates of convergence related to the decay of the singular values. Our main tool is a spectral norm concentration inequality for infinite complex random matrices with independent rows complementing earlier results by Rudelson, Mendelson, Pajor, Oliveira and Rauhut.


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 412
Author(s):  
Jay Gupta ◽  
Dhaval Pujara ◽  
Jorge Teniente

This paper proposes a wideband profiled horn antenna designed using the piecewise biarc Hermite polynomial interpolation and validated experimentally at 55 GHz. The proposed design proves S11 and directivity better than −22 dB and 25.5 dB across the entire band and only needs 3 node points if compared with the well-known spline profiled horn antenna. Our design makes use of an increasing radius and hence does not present non-accessible regions from the aperture, allowing its fabrication with electro erosion techniques especially suitable for millimeter and submillimeter wavelengths.


2016 ◽  
Vol 10 (3) ◽  
pp. 254-265 ◽  
Author(s):  
Vincent Savaux ◽  
Alexandre Skrzypczak ◽  
Yves Louët

Sign in / Sign up

Export Citation Format

Share Document