Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appearing during various cryptographic setups. Surprisingly, despite decades of in ...
We prove that for all local fields SLn is stable over n in terms of continuous bounded cohomology. We complement this by various computations in low degree, showing notably the vanishing of the third bounded cohomology of SLn(R) for all n. We link the corr ...
Compliance, or elasticity is present in many mechatronic system, e.g. when the transmission of a movement is done using steel cables, belts or elasti shafts. Also, compliance can be present in some gearboxes, typically the harmonic drivers, and in the link ...
We report on a study of B 0 → D(*)0 π+π- decays using 29.1 fb-1 of e+e- annihilation data recorded at the γ(4S) resonance with the Belle detector at the KEKB storage ring. Making no assumptions about the intermediate mechanism, the branching fractions for ...
We report results on the decay B- → DCPK - and its charge conjugate using a data sample of 85.4 × 106 BB̄ pairs recorded at the γ(4S) resonance with the Belle detector at the KEKB asymmetric e+e- storage ring. Ratios of branching fractions of Cabibbo-suppr ...
We present a novel formulation for B-spline snakes that can be used as a tool for fast and intuitive contour outlining. We start with a theoretical argument in favor of splines in the traditional formulation by showing that the optimal, curvature-constrain ...
In this paper we exhibit the full prime factorization of the ninth Fermat number F9 = 2(512) + 1. It is the product of three prime factors that have 7, 49, and 99 decimal digits. We found the two largest prime factors by means of the number field sieve, wh ...
Digital signature schemes often use domain parameters such as prime numbers or elliptic curves. They can be subject to security threats when they are not treated like public keys. In this paper we formalize the notion of "signature scheme with domain param ...
We describe a modification to the well-known large prime variant of the multiple polynomial quadratic sieve factoring algorithm. In practice this leads to a speed-up factor of 2 to 2.5. We discuss several implementation-related aspects, and we include some ...
An implementation of the Cohen-Lenstra version (see ibid., vol. 42, p.297-330, 1984) of the Adleman-Pomerance-Rumely primality test (see L.M. Adleman, C. Pomerance and R.S. Rumely, Ann. of Math., vol.117, p.173-206, 1983) is presented. Primality of prime n ...