Information Theory – Chapter X Lempel-Ziv coding
This chaper is to talk about LZ78 and its asympotic optimaling.
Information Theory – Chapter 4: Asympotic Equipartition Property(AEP)
Informal statement of AEP: Let X_1,\cdots,X_n be i.i.d. Then almost all realizations (x_1, \cdots,x_…
Information Theory – Chapter 3: Important Inequality
Data Processing Inequality Let X\rightarrow Y\rightarrow Z form a Markov chain if P_{XYZ}(x,y,z)=P_X…
Information Theory – Chapter 2: Property of Entropy
In this chapter, we will further discover the properties of Entropy.
Information Theory – Chapter 1: Entropy
This chapter introduce the definition of entropy, joint entropy, conditional entropy, relative entro…
我的五年
“考试结束,请各位选手双手离开键盘停止作答……” 时间回到2018年4月28日,周六,江西省队选拔现场。我呆滞地看着屏幕,已经意识到自己可能与省队无缘了,一片空白地走出考场,在回学校的车上走马灯式地信…
ABY – A Framework for efficient Mixed-Protocol Secure Two-Party Computation 阅读笔记(Arithmetic部分)
今天看了秘密分享架构中的ABY架构,尤其看了Arithmetic sharing部分,对于该秘密分享机制下的加法与乘法的计算有了一定的了解,而且了解了如何通过Pailler同态加密方法产生c=axb的…
安全多方计算——秘密共享机制
开始看隐私计算的东西了,感觉很有趣。于是写了一下关于秘密分享的东西。
PyTorch Implementation of Convolutional Neural Network
This passage is to solve MNIST problem using CNN, Residual Net and Inception Module.