Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The identification of kinetic models is an important step for the monitoring, control and optimization of industrial processes. This is particularly the case for highly competitive business sectors such as chemical and pharmaceutical industries, where the ...
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing those permutations, we are able to derive most of the best known differential pa ...
Springer2012
,
Instances of control systems are presented for which dynamical feedback linearizability can be assessed from differential forms of highest relative degree after some “contact” transformation has been applied. This bypasses the need to find a polynomial dif ...
We investigate the axial phase evolution of light emerging from microstructures. The high-resolution interference microscope (HRIM) allows to record three-dimensional (3D) phase distributions in differential and propagation modes along the longitudinal dir ...
In this thesis we are interested in the following problem : given two differential k–forms g and f, most of the time they will be assumed closed, on what conditions can we pullback g to f by a map φ ? In other words we ask when it is possible to solve the ...
The contributions of this paper are new 6-round impossible-differential (ID) and 9.75-round known-key distinguishers for the 3D block cipher. The former was constructed using the miss-in-the-middle technique, while the latter with an inside-out technique. ...
This paper presents the first independent and systematic lin- ear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at constrained devices such as RFID tags and sensor networks. Our contributions include ...
Springer2010
In Control System Theory, the study of continuous-time, finite dimensional, underdetermined systems of ordinary differential equations is an important topic. Classification of systems in different categories is a natural initial step to the analysis of a g ...
In this paper we present a new statistical cryptanalytic technique that we call improbable differential cryptanalysis which uses a differential that is less probable when the correct key is used. We provide data complexity estimates for this kind of attack ...
We introduce a new class of wavelets that behave like a given differential operator L. Our construction is inspired by the derivative-like behavior of classical wavelets. Within our framework, the wavelet coefficients of a signal y are the samples of a smo ...