Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Hyper-encryption

Hyper-encryption is a form of encryption invented by Michael O. Rabin which uses a high-bandwidth source of public random bits, together with a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Hybrid-phase-transition FETs (Hyper-FETs) are recently proposed steep switching devices that utilize the phase transition… Expand
  • figure 1
  • table II
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2017
2017
We investigate the ability of the upcoming Hyper-Kamiokande (Hyper-K) neutrino experiment to detect new physics phenomena beyond… Expand
  • table I
  • table II
  • table III
  • figure 1
  • figure 2
Is this relevant?
2015
2015
We study novel scenarios where thermal dark matter (DM) can be efficiently captured in the Sun and annihilate into boosted dark… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2014
2014
We initiate the study of novel thermal dark matter (DM) scenarios where present-day annihilation of DM in the galactic center… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Bent functions, which are maximally nonlinear Boolean functions with even numbers of variables and whose Hamming distance to the… Expand
Is this relevant?
2011
2011
Generalizations of the notion of fuzzy hyper K-subalgebras are considered. The concept of fuzzy hyper K-subalgebras of type… Expand
  • table 2
  • figure 1
Is this relevant?
2010
2010
The successful Mach 7 and 10 flights of the first fully integrated scramjet propulsion systems by the Hyper-X (X-43A) program… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
The security of modern cryptographic schemes relies on limits on computational power and assumptions about the difficulty of… Expand
  • figure 3-1
  • figure 3-2
  • table 3.1
  • figure 4-1
  • figure 4-2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We present substantial extensions of works [1], [2], and all previous works, on encryption in the bounded storage model… Expand
Is this relevant?
2002
2002
  • C. Lu
  • CRYPTO
  • 2002
  • Corpus ID: 15252854
We study the problem of information-theoretically secure encryption in the bounded-storage model introduced by Maurer [10]. The… Expand
  • figure 1
Is this relevant?