Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The validity of the time-intensity superposition principle for the photoinitiated polymerization of nanocomposites based on a monofunctional fluorinated acrylate and on a multifunctional hyperbranched polyether acrylate was investigated in this work. Maste ...
We review the well-known relation between Lucas sequences and exponentiation. This leads to the observation that certain public-key cryptosystems that are based on the use of Lucas sequences have some elementary properties their re-inventors were apparentl ...
We investigate the spin-1/2 Heisenberg model on a rectangular lattice, using the Gutzwiller projected variational wave function known as the staggered flux state. Using Monte Carlo techniques, the variational parameters and instantaneous spin-spin correlat ...
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. These signatures were originally proposed to provide information-theoretic-based security against forgeries. In contrast to classical signature schemes, in wh ...
This paper describes an extremely efficient squaring operation in the so-called ‘cyclotomic subgroup’ of Fq6, for q≡1mod6. Our result arises from considering the Weil restriction of scalars of this group from Fq6 ...
This paper proposes a new modular multiplication method that uses Montgomery residues defined by a modulus M and a Montgomery radix R whose value is less than the modulus M. This condition enables the operand multiplier to be split into two parts that can ...
The security and performance of pairing based cryptography has provoked a large volume of research, in part because of the exciting new cryptographic schemes that it underpins. We re-examine how one should implement pairings over ordinary elliptic curves f ...
We establish a sharp estimate on the negative moments of the smallest eigenvalue of the Malliavin matrix gamma z of Z := (u(s, y), u(t , x) - u(s, y)), where u is the solution to a system of d non-linear stochastic heat equations in spatial dimension k >= ...
Recent attacks on standardised hash functions such as SHA1 have reawakened interest in design strategies based on techniques common in provable security. In presenting the VSH hash function, a design based on RSA-like modular exponentiation, the authors in ...
Seismic swarms are often interpreted to be driven by natural fluid pressurization in the Earth’s crust, when seismicity is observed to spread away from a common origin and follows approximately a square-root-of-time pattern of growth. On the other hand, a ...