Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
It’s a special type of Swiss enclave that Denise Bertschi came across in South Africa in 2018: the Swiss Social & Sports Club welcomes Cape Town’s Swiss ex-pat community and temporary visitors to sit back and relax, be they businesspeople, bankers, or fina ...
Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions, modular additions (or other group operations), and when ...
In this paper, we consider the problem of sequentially optimizing a black-box function f based on noisy samples and bandit feedback. We assume that f is smooth in the sense of having a bounded norm in some reproducing kernel Hilbert space (RKHS), yield ...
We study the optimal strategy for a sailboat to reach an upwind island under the hypothesis that the wind direction fluctuates according to a Brownian motion and the wind speed is constant. The work is motivated by a concrete problem which typically arises ...
This work provides a procedure and methodology for the design of an electro-magnetic sensor based on induction due to ferromagnetic and pure electrically conduc-tive hidden targets. The electromagnetic sensor is made of one or several excitation coils, whi ...
The NIST standard FF3 scheme (also known as BPS scheme) is a tweakable block cipher based on a 8-round Feistel Network. We break it with a practical attack. Our attack exploits the bad domain separation in FF3 design. The attack works with chosen plaintext ...
The National Institute of Standards and Technology (NIST) recently published a Format-Preserving Encryption standard accepting two Feistel structure based schemes called FF1 and FF3. Particularly, FF3 is a tweakable block cipher based on an 8-round Feistel ...
We investigate the stability and stabilization of the cubic focusing Klein-Gordon equation around static solutions on the closed ball in R3. First we show that the system is linearly unstable near the static solution u≡1 for any dissipat ...
Slender yet densely packed with images, this 44-page publication presents items discovered during an artistic research project that investigated various relationships between Swiss people and the South African apartheid regime in the 1980s and 1990s. Adver ...
Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions, modular additions (or other group operations), and when ...