Recommendations
FPL analysis for adaptive bandits
SAGA'05: Proceedings of the Third international conference on StochasticAlgorithms: foundations and applicationsA main problem of “Follow the Perturbed Leader” strategies for online decision problems is that regret bounds are typically proven against oblivious adversary. In partial observation cases, it was not clear how to obtain performance guarantees against ...
Special feature: A structured symmetric-key block cipher
This paper presents a simple and structured symmetric-key block cipher called CHAIN which provides for variation in the block size, the key size, and the number of rounds of ciphering. This cipher performs encryption in three stages: mixing, permutation,...






Comments