The security of the birational permutation signature schemes
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Because building-integrated photovoltaic (BIPV) modules are fully integrated into a building envelope, the back of the module can be exposed to little or no ventilation, resulting in increased operating temperatures. As the temperature increases, the perfo ...
Let K be an algebraically closed field of characteristic zero, and let G be a connected reductive algebraic group over K. We address the problem of classifying triples (G, H, V ), where H is a proper connected subgroup of G, and V is a finitedimensional ir ...
This study explores the differences in performance and results by various versions of the ISORROPIA thermodynamic module implemented within the ECHAM/MESSy Atmospheric Chemistry (EMAC) model. Three different versions of the module were used, ISORROPIA II v ...
Modular robotics link the reliability of a centralised system with the adaptivity of a decentralised system. It is difficult for a robot with a fixed shape to be able to perform many different types of tasks. As the task space grows, the number of function ...
A correspondence functor is a functor from the category of finite sets and correspondences to the category of k-modules, where k is a commutative ring. By means of a suitably defined duality, new correspondence functors are constructed, having remarkable p ...
In high energy physics, semiconductor-based sensors are widely used in particle tracking applications. These sensors are typically glued on low-mass cooling substrates, which guarantee the correct thermal management and, at the same time, minimise their in ...
Commitment is a key primitive which resides at the heart of several cryptographic protocols. Noisy channels can help realize information-theoretically secure commitment schemes; however, their imprecise statistical characterization can severely impair such ...
We examine the moments of the number of lattice points in a fixed ball of volume V for lattices in Euclidean space which are modules over the ring of integers of a number field K. In particular, denoting by ωK the number of roots of unity in K, we ...
It is well-known that for any integral domain R, the Serre conjecture ring R(X), i.e., the localization of the univariate polynomial ring R[X] at monic polynomials, is a Bezout domain of Krull dimension
The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a polynomial-time key-recovery attack. While some countermeasures have been proposed, th ...