Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the \chi ^2 Method.
Srimanta BhattacharyaMridul NandiPublished in: EUROCRYPT (1) (2018)
Keyphrases
- experimental evaluation
- dynamic programming
- high accuracy
- cost function
- optimization algorithm
- prior knowledge
- significant improvement
- preprocessing
- objective function
- probabilistic model
- segmentation method
- synthetic data
- clustering method
- mutual information
- classification method
- fully automatic
- classification accuracy
- denoising
- support vector machine
- similarity measure
- pairwise
- bayesian networks