Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Controlling the cis C20/C21 relative stereochemistry remains an unsolved issue in the synthesis of eburnane-type indole alkaloids. Provided herein is a simple solution to this problem by developing a unified and diastereoselective synthesis of four represe ...
Ice calving is the breakaway process of icebergs which plays an important role in the dy- namics and the mass balance of ice sheets. Our project is to use Akantu (An open source object-oriented Finite Element library by LSMS) to reproduce the fracturing st ...
A key problem in emerging complex cyber-physical networks is the design of information and control topologies, including sensor and actuator selection and communication network design. These problems can be posed as combinatorial set function optimization ...
By theoretically investigating the optical behavior of one-dimensional gold nanogratings using Fourier Modal Method, we have shown that both integer and non-integer multiples of surface plasmon polariton wavelengths should be taken into consideration in sp ...
In the last decade, Compressive Sensing (CS) has emerged as the most promising, model-driven approach to accelerate MRI scans. CS relies on the key sparsity assumption and proposes random sampling for data acquisition. The practical CS approaches in MRI em ...
In our daily lives, people or devices frequently need to learn their location for many reasons as some services depend on the absolute location or the proximity. The outcomes of positioning systems can have critical effects e.g., on military, emergency. Th ...
Within the context of market globalisation, the quality of products has become a key factor for success in manufacturing industry. The growing unpredictability of demand necessitates continuous adjustments in production targets. Addressing customer needs a ...
Distance-bounding protocols allow a verifier to both authenticate a prover and evaluate whether the latter is located in his vicinity. These protocols are of particular interest in contactless systems, e.g. electronic payment or access control systems, whi ...
The stream cipher Sprout with a short internal state was proposed in FSE 2015. Although the construction guaranteed resistance to generic Time Memory Data Tradeoff attacks, there were some weaknesses in the design and the cipher was completely broken. In t ...
Authenticated Encryption (AE) is a symmetric key cryptographic primitive that ensures confidentiality and authenticity of processed messages at the same time. The research
of AE as a primitive in its own right started in 2000.The security goals of AE wer ...