Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...tacks, such as by identifying data encrypted with weak ciphers or obsolete algorithms, fingerprinting applications to track users or identify software versions w ...e up to 100% overhead by nearly doubling the object's size, while a PURB's padding imposes overhead of at most 12% for small strings and decreasing gradually ...
    11 KB (1,645 words) - 08:12, 4 January 2023
  • |style="border-right:0px solid rgb(0, 255, 0); padding-left:1em; padding-right:1em;"| |style="padding-right:1em; padding-left:1em;"| ...
    13 KB (1,907 words) - 20:22, 10 July 2024
  • === Padding === Padding involves adding extra pixels around the edges of the input data. It serves ...
    11 KB (1,473 words) - 19:22, 27 February 2025
  • ...'r'', and two numbers of [[Round (cryptography)|rounds]] ''a'', ''b''. All algorithms support [[authenticated encryption]] with plaintext P and [[additional auth === Padding === ...
    8 KB (1,197 words) - 10:53, 27 November 2024
  • ...t k-FWL and (k+1)-WL are equivalent (for <math>k\geq 2</math>). Since both algorithms scale exponentially in k (both iterate over all k-tuples), the use of k-FWL |style="padding-left:1em;padding-right:1em;"| ...
    19 KB (2,908 words) - 23:29, 17 February 2025
  • ...plete]] languages do not have polynomial-time nondeterministic recognition algorithms.{{r|g}} However, for the {{nowrap|<math>k</math>-creative}} sets, the lack The classes of fast nondeterministic recognition algorithms are formalized by Joseph and Young as the sets <math>\mathrm{NP}^{(k)}</mat ...
    12 KB (1,807 words) - 01:02, 18 September 2024
  • ...]] {{clarify|date=February 2015}}, ECOH applies a [[Padding (cryptography)|padding]] function. Assuming random oracles, finding a [[Collision resistance|colli ...r with two more points. One additional point <math>X_1</math> contains the padding and depends only on the message length. The second additional point <math>X ...
    11 KB (1,708 words) - 18:39, 7 January 2025
  • # Add padding % Add padding ...
    11 KB (1,600 words) - 01:46, 17 May 2024
  • ...class]]es, rather than computational complexity of individual problems and algorithms. It involves the research of both internal structures of various complexity ...n ''s''(''n'') = log ''n'', it implies the general theorem by a standard [[padding argument]]{{Citation needed|date=July 2010}}. The result solved the [[linea ...
    6 KB (819 words) - 09:43, 22 October 2023
  • ...p> × ''A''<sup>#</sup>)*. Here ''A''<sup>#</sup> is ''A'' augmented with a padding symbol.<ref>{{citation ...7 | editor1-last=Gomes | editor1-first=Gracinda M. S. | title=Semigroups, algorithms, automata and languages. Proceedings of workshops held at the International ...
    6 KB (772 words) - 21:51, 25 February 2025
  • * a padding function ''P'' ...
    7 KB (988 words) - 02:38, 6 February 2025
  • ...has a subexponential time algorithm then they all do, and that many known algorithms for these problems have optimal or near-optimal time {{nowrap|complexity.{{ .../math>.}} This minimum might not exist, if a sequence of better and better algorithms have correspondingly smaller exponential growth in their time bounds; in th ...
    22 KB (3,167 words) - 18:17, 18 August 2024
  • ...equential algorithms can not perform better than linear time, but parallel algorithms leave some space left to optimize. == Algorithms == ...
    20 KB (3,154 words) - 13:21, 9 November 2024
  • ...barcodes and it must be detected with slow [[Blob detection|blob detection algorithms]] like [[Gabor filter]] or [[Circle Hough Transform]].{{cn|date=May 2024}} * Corner points, marked as red on diagram, which can be used as data bits or padding bits (black dots); ...
    25 KB (3,332 words) - 10:22, 13 December 2024
  • ...its of the key material are encrypted with the cipher to produce a 128-bit padding block <math>\mathit{pad}</math>. [[Category:Symmetric-key algorithms]] ...
    10 KB (1,418 words) - 05:09, 28 December 2024
  • For small message sizes, the creators of the Keccak algorithms and the SHA-3 functions suggest using the faster function [[#KangarooTwelve ...of 2008. Keccak was accepted as one of the 51 candidates. In July 2009, 14 algorithms were selected for the second round. Keccak advanced to the last round in De ...
    52 KB (7,730 words) - 18:17, 7 February 2025
  • .../978-3-319-15943-0_18 |language=en}}</ref> LSH is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP). ...ash function LSH has the wide-pipe Merkle-Damgård structure with one-zeros padding. ...
    44 KB (5,850 words) - 00:16, 21 July 2024
  • ...ull algorithms specification is written by Victor Shoup. Implementation of algorithms is done by Thomas Schweinberger and Mehdi Nassehi, its supporting and maint ...h <math>A \in \left\{b,B,W\right\}</math> and <math>l>0</math> we define a padding operator: ...
    21 KB (3,533 words) - 20:49, 24 January 2023
  • ...[[Universal Dependencies]]) has proceeded alongside the development of new algorithms and methods for parsing. Algorithms generally require the CFG to be converted to [[Chomsky Normal Form]] (with ...
    23 KB (3,324 words) - 03:01, 8 January 2024
  • ...quires taking the DFT and inverse DFT, it is possible to utilize efficient algorithms such as the [[Fast Fourier transform]] (FFT). Circular convolution can also ...dding for every convolution on each input component. Instead of using zero padding to prevent time-domain aliasing like its overlap-add counterpart, overlap-s ...
    41 KB (6,543 words) - 17:35, 26 November 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)