Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • {{Computational hardness assumptions}} [[Category:Computational hardness assumptions]] ...
    951 bytes (123 words) - 15:06, 19 April 2023
  • ...s conjecture''' or '''2-cycle conjecture''' is an unproven [[computational hardness assumption]] asserting that solving the 1-vs-2 cycles problem in the [[mass ...similar communication [[lower bound]]s for several other problems in this computational model, including [[single-linkage clustering]]{{r|yv}} and geometric [[mini ...
    4 KB (518 words) - 00:29, 13 January 2025
  • ...xity theory]], a '''fine-grained reduction''' is a transformation from one computational problem to another, used to relate the difficulty of improving the time bou Let <math>A</math> and <math>B</math> be computational problems, specified as the desired output for each possible input. ...
    6 KB (860 words) - 07:36, 29 January 2023
  • ...the '''planted clique conjecture'''; it has been used as a [[computational hardness assumption]]. ...e a graph, by the following random process:<ref name="ab">{{citation|title=Computational Complexity: A Modern Approach|first1=Sanjeev|last1=Arora|author1-link=Sanje ...
    13 KB (1,908 words) - 11:07, 26 February 2025
  • {{Short description|Computational hardness assumption}} ...small set expanders. This assumption implies the hardness of several other computational problems, and the optimality of certain known [[approximation algorithm]]s. ...
    13 KB (1,823 words) - 10:41, 8 January 2024
  • ...yclic lattices, and efficient one-way functions from worst-case complexity assumptions.] Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE ...nsky, Lenny, and Xun Sun. [On the geometry of cyclic lattices.] Discrete & Computational Geometry 52.2 (2014): 240–259.</ref> ...
    16 KB (2,577 words) - 04:28, 23 September 2024
  • ...606347 |issn=0004-5411}}</ref> In more technical terms, it refers to the [[computational problem]] of inferring a linear <math>n</math>-ary function <math>f</math> ...ly, the LWE problem has been used as a [[Computational hardness assumption|hardness assumption]] to create [[Public-key cryptography|public-key cryptosystems]] ...
    20 KB (3,183 words) - 23:27, 3 May 2024
  • ...ure) had to wait until Jain, Lin, and Sahai (2020). (Even so, one of these assumptions used in the 2020 proposal is not secure against [[quantum computers]].) {{Broader|Computational indistinguishability}} ...
    23 KB (3,107 words) - 13:53, 10 October 2024
  • {{short description|Unproven computational hardness assumption}} ...NP problem|P ≠ NP]], but it is a stronger statement. It implies that many computational problems are equivalent in complexity, in the sense that if one of them has ...
    22 KB (3,167 words) - 18:17, 18 August 2024
  • ...[[Computational hardness assumption|assumption]] that certain well-studied computational [[lattice problem]]s cannot be solved efficiently. ...ographic hash function]] whose security is equivalent to the computational hardness of SIS. ...
    24 KB (3,173 words) - 01:44, 18 February 2025
  • ...a basis for extremely secure cryptographic schemes. The use of worst-case hardness in such schemes makes them among the very few schemes that are very likely ...{{cite journal |author-link=Subhash Khot |first=Subhash |last=Khot |title=Hardness of approximating the shortest vector problem in lattices |journal=J. ACM |v ...
    28 KB (4,074 words) - 21:46, 21 April 2024
  • ...''n'')-Ideal-SVP). The average-case collision-finding problem is a natural computational problem called Ideal-SIS, which has been shown to be as hard as the worst-c ...] [[Cryptographic hash function|hash functions]] can be built based on the hardness of finding an approximate [[Lattice problem|shortest vector]] in such latti ...
    39 KB (5,924 words) - 06:23, 17 June 2024
  • ...are [[Computational hardness assumption|computational assumptions]]. Such assumptions consists of two parts. First, one assumes that a particular problem is diff ...ptography]] physical assumptions appear, which do not rely on any hardness assumptions, but merely assume a limit on some other resource. In classical cryptograph ...
    22 KB (3,003 words) - 01:14, 25 December 2024
  • {{short description|Computational problem possibly useful for post-quantum cryptography}} ...uantum cryptography]], '''ring learning with errors''' ('''RLWE''') is a [[computational problem]] which serves as the foundation of new cryptographic [[algorithm]] ...
    20 KB (3,067 words) - 21:43, 13 November 2024
  • ...nditional to appropriate [[Computational hardness assumption|cryptographic assumptions]]):<ref name=":0" /> ...
    7 KB (1,015 words) - 15:58, 14 October 2024
  • ...key, provided the appropriate [[Computational hardness assumption|hardness assumptions]] are satisfied of course, and provided the PURB is padded to one of the al ...
    11 KB (1,645 words) - 08:12, 4 January 2023
  • ...is a type of [[algorithm]] that aims to find approximate solutions to [[NP-hardness|NP-hard]] [[optimization problem]]s in polynomial time in the input size an ...n |date=2020 |title=A Survey on Approximation in Parameterized Complexity: Hardness and Algorithms |journal=Algorithms |language=en |volume=13 |issue=6 |pages= ...
    28 KB (3,832 words) - 13:49, 29 July 2024
  • {{Short description|Economical computational problem}} ...ve equilibrium computation''' or '''clearing-prices computation''') is a [[computational problem]] in the intersection of [[economics]] and [[computer science]]. Th ...
    26 KB (4,108 words) - 21:07, 14 March 2024
  • ...solved in polynomial time for arbitrary graphs unless [[P = NP]]. Stronger hardness results are also known showing that it is difficult to [[approximation algo ==NP-hardness== ...
    22 KB (3,035 words) - 20:57, 12 October 2024
  • ...t effective method for finding discrete logarithms, consists of four large computational steps, of which the first three depend only on the order of the group G, no [[Category:Computational hardness assumptions]] ...
    12 KB (1,625 words) - 17:17, 5 July 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)