Revisiting Multivariate Lattices for Encrypted Signal Processing
Related publications (32)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this paper we address the problem of driving a group of agents towards a consensus point when the agents have a discrete-time single- or double-integrator dynamics and the communication network is time-varying. We propose decentralized Model Predictive ...
Injection locking of two DFB semiconductors opens new possibilities to generate effective signals for optical sensing, in order to reach better performances. Pure wave forms can be generated with qualities exceeding those obtained using external modulators ...
We present a comparison of different two-step holographic recording schemes based on their multiplexing performance using a unified framework. The difference between the different schemes is mainly due to the energy levels and sources of the traps. The inf ...
Spie-Int Soc Optical Engineering, Po Box 10, Bellingham, Wa 98227-0010 Usa1998
Personal computing and communication devices such as computers, personal digital assistants (PDAs), and mobile phones are moving to their next generation in which the end user will be able to access a multitude of information with a single device either lo ...
A multi-stage secret sharing (MSS) scheme is a method of sharing a number of secrets among a set of participants, such that any authorized subset of participants could recover one secret in every stage. The first MSS scheme was proposed by He and Dawson in ...
In recent years, researchers have invested a lot of effort in trying to design suitable alternatives to the RSA signature scheme, with lower computational requirements. The idea of using polynomial equations of low degree in several unknowns, with some hid ...
This paper presents a numerical simulation study of the transient behavior of a 2x340MW pump-turbine power plant, where the results show an unstable behavior at runaway. First, the modeling of hydraulic components based on equivalent schemes is presented. ...
International Association For Hydraulic Research2008
In some remote sensing applications, the functional relationship between the source being observed and the sensor readings may not be known. Because of communication constraints, this uncertainty may result in poor end-to-end distortion. If the sensors hav ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2005
We consider a simple network, where a source and destination node are connected with a line of erasure channels. It is well known that in order to achieve the min-cut capacity, the intermediate nodes are required to process the information. We propose codi ...
In this paper, we introduce novel schemes for scalable Distributed Video Coding (DVC), dealing with temporal, spatial and quality scalabilities. More specifically, conventional coding is used to obtain a base layer. DVC is then applied to generate enhancem ...