Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Digital signature schemes often use domain parameters such as prime numbers or elliptic curves. They can be subject to security threats when they are not treated like public keys. In this paper we formalize the notion of "signature scheme with domain param ...
We report on a study of B 0 → D(*)0 π+π- decays using 29.1 fb-1 of e+e- annihilation data recorded at the γ(4S) resonance with the Belle detector at the KEKB storage ring. Making no assumptions about the intermediate mechanism, the branching fractions for ...
In this paper we exhibit the full prime factorization of the ninth Fermat number F9 = 2(512) + 1. It is the product of three prime factors that have 7, 49, and 99 decimal digits. We found the two largest prime factors by means of the number field sieve, wh ...
We present a novel formulation for B-spline snakes that can be used as a tool for fast and intuitive contour outlining. We start with a theoretical argument in favor of splines in the traditional formulation by showing that the optimal, curvature-constrain ...
Compliance, or elasticity is present in many mechatronic system, e.g. when the transmission of a movement is done using steel cables, belts or elasti shafts. Also, compliance can be present in some gearboxes, typically the harmonic drivers, and in the link ...
We prove that for all local fields SLn is stable over n in terms of continuous bounded cohomology. We complement this by various computations in low degree, showing notably the vanishing of the third bounded cohomology of SLn(R) for all n. We link the corr ...
The generation of prime numbers underlies the use of most public-key schemes, essentially as a major primitive needed for the creation of key pairs or as a computation stage appearing during various cryptographic setups. Surprisingly, despite decades of in ...
An implementation of the Cohen-Lenstra version (see ibid., vol. 42, p.297-330, 1984) of the Adleman-Pomerance-Rumely primality test (see L.M. Adleman, C. Pomerance and R.S. Rumely, Ann. of Math., vol.117, p.173-206, 1983) is presented. Primality of prime n ...
We report results on the decay B- → DCPK - and its charge conjugate using a data sample of 85.4 × 106 BB̄ pairs recorded at the γ(4S) resonance with the Belle detector at the KEKB asymmetric e+e- storage ring. Ratios of branching fractions of Cabibbo-suppr ...
We describe a modification to the well-known large prime variant of the multiple polynomial quadratic sieve factoring algorithm. In practice this leads to a speed-up factor of 2 to 2.5. We discuss several implementation-related aspects, and we include some ...