Physical one-way functions
暂无分享,去创建一个
[1] Gabriel Cristóbal,et al. Image Representation with Gabor Wavelets and Its Applications , 1997 .
[2] Wolf,et al. Weak localization and coherent backscattering of photons in disordered media. , 1985, Physical review letters.
[3] David Hoadley,et al. Experimental comparison of the phase-breaking lengths in weak localization and universal conductance fluctuations , 1999 .
[4] Gustavus J. Simmons,et al. Contemporary Cryptology: The Science of Information Integrity , 1994 .
[5] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[6] Peter M. A. Sloot,et al. Large Scale Simulations of Elastic Light Scattering by a Fast Discrete Dipole Approximation , 1998 .
[7] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[8] Kogan,et al. Random-matrix-theory approach to the intensity distributions of waves propagating in a random medium. , 1995, Physical review. B, Condensed matter.
[9] J. Daugman. Two-dimensional spectral analysis of cortical receptive field profiles , 1980, Vision Research.
[10] Gregory J. Chaitin,et al. On the Length of Programs for Computing Finite Binary Sequences , 1966, JACM.
[11] Marcus,et al. Ballistic conductance fluctuations in shape space. , 1995, Physical review letters.
[12] Feng,et al. Correlations and fluctuations of coherent wave transmission through disordered media. , 1988, Physical review letters.
[13] H. V. Hulst. Light Scattering by Small Particles , 1957 .
[14] M. V. Rossum,et al. Multiple scattering of classical waves: microscopy, mesoscopy, and diffusion , 1998, cond-mat/9804141.
[15] A. Kolmogorov. Three approaches to the quantitative definition of information , 1968 .
[16] Larry J. Hornbeck,et al. Deformable-Mirror Spatial Light Modulators , 1990, Optics & Photonics.
[17] SHECHAO FENG,et al. Mesoscopic Conductors and Correlations in Laser Speckle Patterns , 1991, Science.
[18] E. Swanson,et al. Optical Coherence Tomography , 1992, LEOS '92 Conference Proceedings.
[19] Charles H. Bennett,et al. The thermodynamics of computation—a review , 1982 .
[20] Thomas Kailath. Multivariable Control, Simulation, Optimization, and Signal Processing for the Microlithographic Process , 2001 .
[21] Mihir Bellare,et al. A Note on Negligible Functions , 2002, Journal of Cryptology.
[22] N. F. de Rooij,et al. Silicon micromechanics for the fiber-optic information highway , 1998 .
[23] Edward H. Adelson,et al. IMAGE DATA COMPRESSION WITH THE LAPLACIAN PYRAMID , 1981 .
[24] Silvio Micali,et al. Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing , 1996, CRYPTO.
[25] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[26] Maynard,et al. Instabilities of waves in nonlinear disordered media , 2000, Physical review letters.
[27] Claude E. Shannon,et al. The Mathematical Theory of Communication , 1950 .
[28] Ray J. Solomonoff,et al. A Formal Theory of Inductive Inference. Part II , 1964, Inf. Control..
[29] D J Heeger,et al. Model for the extraction of image flow. , 1987, Journal of the Optical Society of America. A, Optics and image science.
[30] J. Fujimoto,et al. Optical Coherence Tomography , 1991, LEOS '92 Conference Proceedings.
[31] Adam Shostack,et al. Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards , 1999, Smartcard.
[32] J W Goodman,et al. Holographic reciprocity law failure. , 1984, Applied optics.
[33] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[34] Berkovits. Sensitivity of the multiple-scattering speckle pattern to the motion of a single scatterer. , 1991, Physical review. B, Condensed matter.
[35] Spivak,et al. Mesoscopic sensitivity of speckles in disordered nonlinear media to changes of the scattering potential , 2000, Physical review letters.
[36] Gabriel Cristóbal,et al. Space and frequency variant image enhancement based on a Gabor representation , 1994, Pattern Recognit. Lett..
[37] W. Wootters,et al. A single quantum cannot be cloned , 1982, Nature.
[38] S Kirkpatrick,et al. Critical Behavior in the Satisfiability of Random Boolean Expressions , 1994, Science.
[39] Maurice V. Wilkes,et al. Time-sharing computer systems , 1968 .
[40] P. Anderson. Absence of Diffusion in Certain Random Lattices , 1958 .
[41] Philip W. Anderson,et al. The question of classical localization A theory of white paint , 1985 .
[42] Bruce Schneier,et al. An authenticated camera , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[43] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[44] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[45] Claude E. Shannon,et al. A mathematical theory of communication , 1948, MOCO.
[46] John G. Daugman,et al. Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression , 1988, IEEE Trans. Acoust. Speech Signal Process..
[47] J. Fujimoto,et al. Optical Coherence Tomography , 1991 .
[48] Dennis Gabor,et al. Theory of communication , 1946 .
[50] A. Lagendijk,et al. Observation of weak localization of light in a random medium. , 1985, Physical review letters.
[51] Van Renesse,et al. Optical document security , 1994 .
[52] J. Daugman. Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. , 1985, Journal of the Optical Society of America. A, Optics and image science.
[53] Thomas K. Gaylord,et al. Ballistic electron transport in semiconductor heterostructures and its analogies in electromagnetic propagation in general dielectrics , 1991, Proc. IEEE.
[54] Ueli Maurer,et al. Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[55] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[56] Gilles Brassard,et al. Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.
[57] Alexander H. Slocum,et al. Design of three-groove kinematic couplings , 1992 .
[58] Oscar Nestares,et al. Efficient spatial-domain implementation of a multiscale image representation based on Gabor functions , 1998, J. Electronic Imaging.
[59] Charles F. Hockett,et al. A mathematical theory of communication , 1948, MOCO.
[60] S. Datta. Electronic transport in mesoscopic systems , 1995 .
[61] J. Goodman. Statistical Optics , 1985 .
[62] Leo Marks. Between Silk and Cyanide: A Codemaker's War, 1941-1945 , 1998 .
[63] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[64] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[65] Feng,et al. Memory effects in propagation of optical waves through disordered media. , 1988, Physical review letters.
[66] Oded Goldreich,et al. Modern Cryptography, Probabilistic Proofs and Pseudorandomness , 1998, Algorithms and Combinatorics.
[67] A. Turing. On Computable Numbers, with an Application to the Entscheidungsproblem. , 1937 .
[68] R. Howard,et al. Electrons in Silicon Microstructures , 1986, Science.
[69] J. Daugman. Spatial visual channels in the fourier plane , 1984, Vision Research.