indistinguishability


Also found in: Dictionary, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • noun

Synonyms for indistinguishability

References in periodicals archive ?
A smaller cavity handles the efficient extraction of photons, while an attached large cavity stores them a bit longer to boost indistinguishability.
What we see in the new verse is that the chain of command actually goes through Laksmana, or rather that there is a simultaneity of gazes and, indeed, a heightened indistinguishability in the sense that, visually speaking, Rama is no longer distinguished from his brother by raising his finger, as he does in the Sanskrit.
An IDERMKS scheme must meet the following security requirements: (1) ciphertext indistinguishability and (2) trapdoor indistinquishability.
The capacity to apprehend, in its apparent indistinguishability from the sensus communis, is that paradoxical part of uniquely human understanding that we nonetheless share with beasts.
This completes the proof of dCRKS ciphertexts indistinguishability.
There are always marks to be followed, or not, traces that recede into indistinguishability yet call upon me in ways and from places that I cannot predict and that remain to be seen.
Against the Irrelevance of Indistinguishability Argument
Privacy Models Must Maximize Indistinguishability Between Pseudoids.
Ben-Naim and Casadei present readers with a comprehensive textbook introduction to contemporary thermodynamics utilizing an approach beginning from four fundamental physical facts: the atomic nature of matter, the indistinguishability of atoms and molecules of the same species, the existence of equilibrium states, and the uncertainty principle.
We have already begun too late, representing the two determinacies of humanity and animality before us and then, in trying to distinguish them, find that we're led back to their indistinguishability (in this respect it is no accident that The Open begins with an image--a representation or Vorstellung that gets the discussion off the ground).
To handle this case, Bellare and Rogaway [1] first provided BR security model for AKE which was based on indistinguishability. The BR95 [2] and BPR2000 [3] models were extensions to the BR93 model.
In order to evaluate the location indistinguishability among Prophet, CLPP [16], and DP [17], we selected two sensitive locations in our next experiment as illustrated in [16].
In essence, the subgroup indistinguishability assumption is that an element in group G' is computationally indistinguishable from a random element in [G'.sub.p] or [G'.sub.q].
The security of these constructions has been considered computationally either in the random oracle model [11] or using computational indistinguishability and infeasibility assumptions [5].
This paper introduces a cryptographic formalization of steganographic security in terms of computational indistinguishability from a channel, an indexed family of probability distributions on cover messages.