### Table 1: Training Environment, Sample Private Information

2008

"... In PAGE 5: ... Thus only one of the three variable pairs has a strong relation. Table1 shows an example of the empirical information given to a subject in the training environment. This subject sees the values of variables A and B for ten random cases drawn from the true distribution.... In PAGE 5: ... Initially, subjects do not know which variables in A,B,C correspond to which variables in X,Y,Z; all six possible permutations are equally likely. A subject who saw the data from Table1 , however, might reasonably infer that the variables A and B are unlikely to be strongly related, and that A was a good candidate to be the variable X. Note that the sections Sum and Same of the table give redundant summaries of these ten cases; if forced to, subjects could compute these statistics for themselves.... ..."

Cited by 2

### Table 1: Training Environment, Sample Private Information

2008

"... In PAGE 5: ... Thus only one of the three variable pairs has a strong relation. Table1 shows an example of the empirical information given to a subject in the training environment. This subject sees the values of variables A and B for ten random cases drawn from the true distribution.... In PAGE 5: ... Initially, subjects do not know which variables in A,B,C correspond to which variables in X,Y,Z; all six possible permutations are equally likely. A subject who saw the data from Table1 , however, might reasonably infer that the variables A and B are unlikely to be strongly related, and that A was a good candidate to be the variable X. Note that the sections Sum and Same of the table give redundant summaries of these ten cases; if forced to, subjects could easily compute these statistics for themselves.... ..."

Cited by 2

### Table 15: Poverty and Inequality Group Weights Welfare Theil P0 P1 P2 P0*

"... In PAGE 47: ... The second (P0*) corresponds to the computation of the poverty rate under the standard assumption of a lognormal distribution of the within-group income, with endogenous mean and fixed variance. Table15 gives a static image of the differences between the two measures. At the aggregated level, P0* underestimates the poverty rate, but the results differ according to groups.... ..."

Cited by 1

### Table 9: Avoiding Uncommitted Funds by Partially Privatizing Social Security (Private accounts contribution = 2% of payroll)

"... In PAGE 24: ... For this paper, I interpret these reform proposals as asset and liability exchanges that leave net debt unchanged.23 Figure 9 and Table9 illustrate the balance sheet and government debt implications of private accounts. The projection assumes that 2% of payroll taxes are placed in individual accounts instead of the trust fund.... ..."

### Table 4: The Secure Remote Password Protocol

1998

"... In PAGE 7: ... This frees Carol from having to remember Steve apos;s public key and simpli#0Ces the protocol. To authenticate, Carol and Steve engage in the protocol described in Table4 . A description of each step... In PAGE 10: ... The reason for giving away this piece of information will be evident shortly. Such an algorithm can be modeled as an oracle Q that accepts the values A, B, u, g, n, and x from Table4 and computes the session key S = g ab+bux from this input. Q#28g a ;g b +g x ;u;g;n;x#29=g ab+bux The DH conjecture claims that it is di#0Ecult to compute g ab in GF#28n#29 given g a and g b .... ..."

Cited by 141

### Table 4: The Secure Remote Password Protocol

1998

"... In PAGE 7: ... This frees Carol from having to remember Steve apos;s public key and simpli es the protocol. To authenticate, Carol and Steve engage in the protocol described in Table4 . A description of each step... In PAGE 10: ... The reason for giving away this piece of information will be evident shortly. Such an algorithm can be modeled as an oracle Q that accepts the values A, B, u, g, n, and x from Table4 and computes the session key S = gab+bux from this input. Q(ga; gb + gx; u; g; n; x) = gab+bux The DH conjecture claims that it is di cult to compute gab in GF(n) given ga and gb.... ..."

Cited by 141

### Table 1: Estimated expected computational work of the GNFS for larger inputs

1976

"... In PAGE 6: ...Security of Cryptosystems Based on Class Groups Table1 shows some extrapolated running times for the GNFS. They are based on data points of the factorization of RSA-155 (155 decimal digits, 512 bits) with the GNFS [26].... ..."

Cited by 6

### Table 2 Correlation coefficients (Pearson apos;s r) between MT+ contrast responsivity and behavioral measures

2007

"... In PAGE 3: ... 5). Given the considerable overlap between subtests included in these neuropsychological batteries, we relied primarily on 8 composite scores that span various aspects of reading and cognitive processing (see Table2 and Supplementary Table 1). We rely on the composite scores developed and validated by the authors of the test batteries, which have higher reliability and external validity than the component scores.... ..."