Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,407,429 papers from all fields of science
Search
Sign In
Create Free Account
Random permutation
Known as:
Statistical properties of symmetric groups
A random permutation is a random ordering of a set of objects, that is, a permutation-valued random variable. The use of random permutations is often…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
21 relations
Algorithm
Bellman–Ford algorithm
Circular layout
Coding theory
Expand
Broader (1)
Randomness
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Preface
E. de Leeuw
2020
Corpus ID: 235288648
Nowadays, the situation of COVID-19 pandemic is unpredictable around the world. Due to COVID-19 pandemic all over the world…
Expand
2015
2015
Image Encryption using Random Permutation by Different Key Size
R. Dewangan
,
Chandrashekhar Kamargaonkar
,
S. Shankaracharya
2015
Corpus ID: 28742600
Security of information is main aspect in network communication. The information may be in the form of text, voice and multimedia…
Expand
2015
2015
A Robust Watermarking Scheme Based on Maximum Wavelet Coefficient Modification and Optimal Threshold Technique
Chunlei Li
,
Xiaowei Song
,
Zhoufeng Liu
,
A. Zhang
,
Ruimin Yang
Journal of Electrical and Computer Engineering
2015
Corpus ID: 37026306
Digital watermarking has received extensive attention as a new method for copyright protection. This paper proposes a robust…
Expand
2014
2014
Securing Cloud Data in the New Attacker Model
Ghassan O. Karame
,
Claudio Soriente
,
Krzysztof Lichota
,
Srdjan Capkun
IACR Cryptology ePrint Archive
2014
Corpus ID: 15514887
The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary…
Expand
2014
2014
Unweighted Stochastic Local Search can be Effective for Random CSP Benchmarks
Christopher D. Rosin
arXiv.org
2014
Corpus ID: 6208687
We present ULSA, a novel stochastic local search algorithm for random binary constraint satisfaction problems (CSP). ULSA is many…
Expand
2010
2010
A Robust Image Hashing Method Based on Zernike Moments
Yan Zhao
,
Shuozhong Wang
,
Guorui Feng
,
Zhenjun Tang
2010
Corpus ID: 17888348
Image hashing maps an image to a short binary sequence representing the image’s characteristics. This paper proposes a new image…
Expand
2009
2009
Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers
G. Bard
,
S. Ault
,
N. Courtois
Cryptologia
2009
Corpus ID: 15483389
Abstract It has been stated many times that a block cipher is “intended to be” computationally indistinguishable from a random…
Expand
2006
2006
Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers
T. Johansson
,
W. Meier
,
Frédéric Muller
Fast Software Encryption Workshop
2006
Corpus ID: 21307274
We present several attacks against the Achterbahn stream cipher, which was proposed to the eSTREAM competition. We can break the…
Expand
2003
2003
Permutation Generation: Two New Permutation Algorithms
Jie Gao
,
Dianjun Wang
arXiv.org
2003
Corpus ID: 11303467
Two completely new algorithms for generating permutations, shift-cursor algorithm and level algorithm, and their efficient…
Expand
1997
1997
Why GAs are Hard to Use
C. Thornton
1997
Corpus ID: 18015885
,
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE