10 Hits in 2.5 sec

Improved Veron Identification and Signature Schemes in the Rank Metric [article]

Emanuele Bellini, Florian Caullery, Philippe Gaborit, Marc Manzano, Victor Mateu
2019 arXiv   pre-print
We present a signature scheme based on double circulant codes in the rank metric, derived from an identification protocol with cheating probability of 2/3.  ...  Furthermore, among all code-based signature schemes, our proposal has the lowest value of signature plus public key size, and the smallest secret and public key sizes.  ...  .: Signatures et authentifications pour les cryptosystèmes basés sur les codes correcteurs en métrique de Hamming et en métrique rang. Ph.D. thesis, Université de Limoges (2013) 35.  ... 
arXiv:1903.10212v2 fatcat:yd4ymcfcrjd6xcyu74nazco4sm

A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks

Anderson Morais, Ana Cavalli
2013 Journal on spesial topics in mobile networks and applications  
These fake OGMs will be preferred in the neighbor ranking range of target nodes. However, the neighbor ranking range for the Originator is not updated by the target nodes.  ...  Attacking Method 2: Not update the neighbor ranking range of target nodes.  ... 
doi:10.1007/s11036-013-0457-8 fatcat:acrm4mwz3bbepb45vhst2vojwu

Bringing Theory Closer to Practice in Post-quantum and Leakage-resilient Cryptography

Alexandre Raphaël Duc
We try then to adapt our results so that they are easily usable for implementers and for researchers working in practical cryptography.  ...  In this thesis, we focus on two recent hard-problems that became very popular in post-quantum cryptography: the learning with error (LWE) and the learning with rounding problem (LWR).  ...  Later, Peikert and Brakerski et al. showed how to make this reduction classical [BLP + 13, Pei09]. The LWE problem was then used to design a wide range of cryptographic primitives.  ... 
doi:10.5075/epfl-thesis-6807 fatcat:tfizbfqfg5dhdgppyocy5wuj3i

Collaborative domains in internet environments

Eduardo Solana, Jose Rolim
Merci aux étudiants du cours Cryptographie et Sécurité pour tout ce qu'ils m'ont apporté et appris pendant ces années d'enseignement.  ...  Thanks go also to all my ex-colleagues from PricewaterhouseCoopers and in particular to the Global Subject Matter Expert Group and to the Cryptographic Center of Excellence to which I was honored to belong  ...  Juergen parce qu'il m'a toujours soutenu dans ma direction de recherche et parce que son énorme expérience, capacité de travail et son amitié ont toujours été une source d'inspiration pour moi.  ... 
doi:10.13097/archive-ouverte/unige:480 fatcat:wg33edw7ozcp5bp34xjbfmy5ri

Lieu hologrammatique, un concept et une méthodologie complexe de mesure de l'organisation spatiale des réalités sociales

Thibault Pierre Louis Romany
By translating the notions of metric, scale and place, the author's work leads to the proposal of an indisciplinary concept and methodology for measuring the spatialization of social realities: the hologrammatic  ...  Its aim is to explore the urban phenomena and to produce visions, strategies and projects on this primary and crucial topic », Centre Habitat, EPFL, 19/03/07.  ... 
doi:10.5075/epfl-thesis-9497 fatcat:k5s5jxclzjerlj2nfa5f6ewoke

Survey on nonlocal games and operator space theory

Carlos Palazuelos, Thomas Vidick
2016 Journal of Mathematical Physics  
many of the applications of quantum mechanics to information theory, cryptography and algorithms.  ...  inequalities, and quantify the nonlocality of different classes of entangled states.  ...  The domain of J is normed with · 3,ǫ and its range with · 2,ǫ .  ... 
doi:10.1063/1.4938052 fatcat:jbj2bjwehfdapfzblhmldpxuyi

Contribution à la conception de systèmes numériques adaptatifs

Pascal Benoit, Pascal
Nous donnons dans la suite un rapide aperçu de quelques métriques et résultats illustrant leur utilisation.  ...  Tableau 9 . 9 Contremesures et impact au niveau de la surface et de la performance28 security for physical cryptography Figure 70 . 70 Masquage du pipelinePour la deuxième contremesure, notre idée  ...  Security Metrics Measurement To Disclosure Measurement To Disclosure (MTD) is the first metric that was introduced with the advent of SCAs.  ... 

Discourse-level features for statistical machine translation

Thomas Meyer
Les problèmes de l'annotation manuelle et de l'évaluation sont discutés également, et des solutions sont proposées avec de nouvelles procédures d'annotation et métriques d'évaluation.  ...  Features can be ranked by decreasing IG, as shown in Tables 5.4, 5.5 and 5.6, in which ranks were averaged over the first and the second data set in each series.  ...  We show the system configuration and and the discourse connectives used in each configuration in Table 8 .7.  ... 
doi:10.5075/epfl-thesis-6501 fatcat:4f4aapg45nck5bpz32ekv4z6vq

Rake, Peel, Sketch:The Signal Processing Pipeline Revisited

Robin Scheibler
Finally, beyond objective measures, we show that echoes also directly improve speech intelligibility as measured by the perceptual evaluation of speech quality (PESQ) metric.  ...  Dirk Schröder for his help and deep wisdom in acoustics and experiments, his strong and honest opinions, and the ski and hiking trips. v vi Acknowledgments One characteristics of life at LCAV is the constant  ...  the PESQ metric [110] .  ... 
doi:10.5075/epfl-thesis-7651 fatcat:36ckogcv3nf4fdz3lx2zzihdre

The structure of fractional spaces generated by the positive operator with periodic conditions

Allaberen Ashyralyev, Fatih Sabahattin Tetikoğlu
many of the applications of quantum mechanics to information theory, cryptography, and algorithms.  ...  We survey recent results that exploit this connection to derive large violations of Bell inequalities, study the complexity of the classical and quantum values of games and their relation to Grothendieck  ...  The domain of J is normed with ∥ · ∥ 3,ϵ and its range with ∥ · ∥ 2,ϵ .  ... 
doi:10.1063/1.4747638 fatcat:lsarewhwhbhfpnrk4p524gryvq