Explore >> Select a destination


You are here

awwalker.com
| | qchu.wordpress.com
7.1 parsecs away

Travel
| | This is a post I wanted to write some time ago; I've forgotten why, but it was short and cute enough to finish. Our starting point is the following observation: Theorem 1: Universal lossless compression is impossible. That is, there is no function which takes as input finite strings (over some fixed alphabet) and always...
| | www.jeremykun.com
4.9 parsecs away

Travel
| | Last time we covered an operation in the LWE encryption scheme called modulus switching, which allows one to switch from one modulus to another, at the cost of introducing a small amount of extra noise, roughly $\sqrt{n}$, where $n$ is the dimension of the LWE ciphertext. This time we'll cover a more sophisticated operation called key switching, which allows one to switch an LWE ciphertext from being encrypted under one secret key to another, without ever knowing either secret key.
| | modexp.wordpress.com
4.9 parsecs away

Travel
| | Introduction Compressed, encrypted, and random data all contain a high amount of entropy, which is why many products use entropy analysis to detect malicious code in binaries that have never been examined before. In a previous post about masking, I suggested using a deterministic random number generator with the Fisher-Yates shuffle to try and scramble...
| | www.opengl-tutorial.org
28.2 parsecs away

Travel
| Free tutorials for modern Opengl (3.3 and later) in C/C++